Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 16, Issue 12 - Dec 2012
Volume 16, Issue 11 - Nov 2012
Volume 16, Issue 10 - Oct 2012
Volume 16, Issue 9 - Sep 2012
Volume 16, Issue 8 - Aug 2012
Volume 16, Issue 7 - Jul 2012
Volume 16, Issue 6 - Jun 2012
Volume 16, Issue 5 - May 2012
Volume 16, Issue 4 - Apr 2012
Volume 16, Issue 3 - Mar 2012
Volume 16, Issue 2 - Feb 2012
Volume 16, Issue 1 - Jan 2012
Selecting the target year
Analysis on National Economic Loss of Cyber Attack: Voice Phishing Case
Shin, Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2341~2346
DOI : 10.6109/jkiice.2012.16.11.2341
Voice phishing against the old or weak persons have used the methods which are social engineering in the object and financial structure and function. Until recently Voice phishing from Chaina caused economic devastation and the economic loss by phishing grows with the South Koreans in the whole. Korean government and public organizations involved have been strengthening protection system and a financial security devices. But it is not easy to verify how much effects of security measures are. In this paper I will study the economic loss caused by voice phishing and potential economic effects of security measures and security device reinforcements of the Republic of Korea. Direct costs are reported about 100 million dollars and potential economic effects of voice phinshing secure measures may be around 320 million dollars.
Implementation and Analysis of Multi-precision Multiplication for Public Key Cryptography Based on NDK
Seo, Hwa-Jeong ; Kim, Ho-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2347~2354
DOI : 10.6109/jkiice.2012.16.11.2347
On Android environment, program development is conducted with JAVA SDK. However, using JAVA, it is operated over virtual machine which shows lower performance in terms of speed than traditional C language programming. The method writes program in C language, which conducts operation efficiently. In the paper, we implement multiplication using NDK and SDK to analyze the public key cryptography over Android environment. In case of SDK, we used BigInteger package and in case of NDK, we used Comb method. Moreover, execution time of arithmetic, branch and call operations over Android environment is compared to understand performance enhancement using NDK package.
Fast Generation of 3-D Hologram Fringe Patterns by using the Block Redundancy of 3-D Object Images and the Novel Look-up Table Method
Kim, Si-Hyung ; Koo, Jung-Sik ; Kim, Seung-Cheol ; Kim, Eun-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2355~2364
DOI : 10.6109/jkiice.2012.16.11.2355
Recently, the novel loop-up table(N-LUT) method to solve the tremendous memory problem of the conventional look-up table (LUT) method as well as to increase the generation speed of hologram patterns has been proposed. But, as the resolution of an input 3-D object is enhanced, the number of object points to be calculated for generation of its hologram pattern also increases, which results in a sharp increase of the computation time. Therefore, in this paper, a new approach for fast generation of the hologram pattern of 3-D object images is proposed by using the block redundancy feature of 3-D object images and the N-LUT method. Experimental results show that in the proposed method the number of object points and the overall computation time have been reduced by 43.3 % and 47.9 %, respectively compared to those of the conventional method for the case of the
block size. These good experimental results finally confirm the feasibility of the proposed method.
A Comparative Study of The Internet Topology Generators for Domestic AS-Level Topology
Oh, Dong-Ik ; Lee, Kang-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2365~2373
DOI : 10.6109/jkiice.2012.16.11.2365
To obtain Korea AS-level internet topology, we used three data sources, which include BGP data of UCLA IRL, IRR and IXP data. Using Internet topology generator models(Waxman, BA and GLP), we developed three graphs that have same number of nodes as Korea AS-level Internet. Then we compared each graph with the Korea AS-level Internet topology. Through this study we could find that the existing Internet topology generators can`t simulate Korea AS-level internet.
Enhancing Snippet Extraction Method using Fuzzy and Semantic Features
Park, Sun ; Lee, Yeonwoo ; Cho, Kwangmoon ; Yang, Huyeol ; Lee, Seong Ro ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2374~2381
DOI : 10.6109/jkiice.2012.16.11.2374
This paper proposes a new enhancing snippet extraction method using fuzzy and semantic features. The proposed method creates a delegate of sentence by using semantic features. It extracts snippet using fuzzy association between a delegate sentence and sentence set which well represents query. In addition, the method uses pseudo relevance feedback to expand query which extracts snippet to be well reflected semantic user`s intention. The experimental results demonstrate the proposed method can achieve better snippet extraction performance than the previous methods.
Appendicitis Extraction of Abdomen Ultrasonographic Images using Facia
Park, Seung-Ik ; Song, Doo Heon ; Kim, Kwang-Baek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2382~2387
DOI : 10.6109/jkiice.2012.16.11.2382
In this paper, we propose a new method to extract and analyze appendicitis from abdomen ultrasonographic image in order to measure the thickness of appendix and change of inflammation correctly. Since the ultrasonographic image has environmental effect in nature, we standardize the image first and the process of extracting appendicitis then extracts the bottom facia which has the critical role to find appendix area. The experiment with real appendicitis patient verifies that the proposed method is more effective than current field expert`s naked eye inspection.
A Simplified Orthogonal Projection Algorithm for Stereo Acoustic Echo Cancellation
Lee, Haeng-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2388~2396
DOI : 10.6109/jkiice.2012.16.11.2388
This paper is on an simplified orthogonal projection method which cancel the acoustic echo signals in the stereo acoustic echo canceller. Comparing with the NLMS algorithm which is widely used for simplicity and stability, it shows that this method has the improvement of the convergence performances for signals with the high auto-correlation, and has small computational quantities. To verify the convergence characteristics of the proposed algorithm, we simulated about various input signals. And we compared the results of simulation for this algorithm with the ones for the NLMS algorithm. By these works, it was proved that the stereo acoustic echo canceller adopting the proposed algorithm shows about 3dB more high ERLE than the NLMS algorithm for the white noise signals, and 5dB for the colored voice signals.
Performance Experimentation and an Optimal Iterative Coding Algorithm for Underwater Acoustic Communication
Park, Gun-Yeol ; Lim, Byeong-Su ; Jung, Ji-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2397~2404
DOI : 10.6109/jkiice.2012.16.11.2397
Underwater acoustic communication has multipath error because of reflection by sea-level and sea-bottom. The multipath of underwater channel causes signal distortion and error floor. In order to improve the performance, it is necessary to employ an iterative coding scheme. Among the iterative coding scheme, turbo codes and LDPC codes are dominant channel coding schemes in recent. This paper concluded that turbo coding scheme is optimal for underwater communications system in aspect to performance, coded word length, and equalizer combining. Also, decision directed phase recovery was used for correcting phase offset induced by multipath. Based on these algorithms, we confirmed the performance in the environment of oceanic experimentation.
Capacity Analysis of VoIP over LTE Network
Ban, Tae Won ; Jung, Bang Chul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2405~2410
DOI : 10.6109/jkiice.2012.16.11.2405
The 4th generation mobile communication system, LTE, does not support an additional core network to provide voice service, and it is merged into a packet network based on all IP. Although Voice service over LTE can be supported by VoIP, it will be provided by the existing 3G networks because of the discontinuity of LTE coverage. However, it is inevitable to adopt VoIP over LTE to provide high quality voice service. In this paper, we investigate the capacity of VoIP over LTE. Our results indicate that spectral efficiency can be significantly improved as channel bandwidth increases in terms of VoLTE capacity. In addition, we can achieve higher VoLTE capacity without decreasing control channel capacity.
Interference Analysis based on System Level Simulation in LTE Networks
Ban, Tae Won ; Jung, Bang Chul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2411~2417
DOI : 10.6109/jkiice.2012.16.11.2411
Globally, the emergence of smart phones vitalized the ecosystem of mobile data service industry. Consequentially, mobile data traffic has been explosively growing and the speed of growth will be more steep. New spectrum will be required in order to properly accommodate the explosively growing mobile data traffic. However, it will be difficult to acquire a sufficient guard band between different frequency bands because the range of frequency which is suitable for wireless communications is limited. Thus, the performance degradation caused by inter-band interference will be one of challenging problems in the next generation mobile communication systems. In this paper, we analyze the performance degradation caused by inter-band interference by computer simulations in various environments. Our results show that the impact of the inter-band interference is more critical when own signal is poor or its own interference from neighboring cells is low.
Usages of Mobile Views for Battery Efficiency of a Smart Phone
Ban, ChaeHoon ; Kim, DongHyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2418~2423
DOI : 10.6109/jkiice.2012.16.11.2418
A smart phone which is one of the new IT technologies can be viable on various enterprise applications since it provides easily information and services. Especially, a smart phone can request queries to a server which finds massive data for decision making and receive the results of the queries from the server. However, a smart phone has a drawback that its battery is consumed easily due to the 4G communication. In this paper, we propose mobile views in order to reduce the easy consumption of a battery on mobile client-server environment. The proposed mobile view scheme reduces the number of communication which is leading to power consumption using materialized views for processing queries. We also classify the methods to control the consistency of the mobile view as the sources of the view are changed and present the cost of each method based on the cost model of battery consumption.
Smart Portable Navigation System Development and Implementation of 1:N service for Visually impaired person
Kim, Jae-Kyung ; Seo, Jae-Gil ; Kim, Young-Kil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2424~2430
DOI : 10.6109/jkiice.2012.16.11.2424
The current Navigation System for the Visually Impaired Person has a short and limited communication distance and can`t receive enough information from Visually Impaired Person to assist directly. In addition, because the path is dangerous and incomplete for the Visually Impaired Person, moving with White Stick is still inconvenient and dangerous. To solve this problem we implement communication that can send and receive video, voice, location information between the Visually Impaired Person`s Smart Portable Navigation System Development and assistant`s PC.
Performance Analysis of Wireless Communication Interface System Module Combined LED Light Device
Jang, Tae-Soo ; Lee, Jun-Myung ; Park, Keon-Jun ; Kim, Yong-Kab ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2431~2436
DOI : 10.6109/jkiice.2012.16.11.2431
This paper is implemented simple visible light communication system by combining the communications through LED lighting. It uses a variable PD sensor to the receiver and 1~12 the LED light-emitting device to the transmitter to realize LED visible light communication. Initial distance value of the developed transmission and receiver is more than 0~1.5m for LED visible light communication, the overall system transmission rate is organized with thousands kbps variability visible light media transmission system. It was measured the performance experiment during lens wearing or not wearing in order to increase the overall efficiency of the LED module, configures the LED and PD to existing PC module for the performance analysis of the implemented research, experiments the maximum communication distance of the transmitter/receiver according to LED count and the transmission rate, check about application methods and the possibility.
Efficient Radio Resource Measurement System in IEEE 802.11 Networks
Yang, Seung-Chur ; Lee, Sung-Ho ; Kim, Jong-Deok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2437~2445
DOI : 10.6109/jkiice.2012.16.11.2437
This paper presents the efficient measurement method of radio resource by analyzing various medium occupied elements. The medium occupied time consists of 802.11 frames, wireless interference, and protocol waiting time from a wireless node on a current channel. And it is used to performance metric. Existing research is only measured partial occupied elements, and is lack of validation of measurement unit and scalability on various IEEE 802.11 radio. This paper presents the measurement method of classified occupied elements. To achieve this, we modified 802.11n based OpenHAL device driver to collect the register information of wireless chipset, and to analyze receiving frames in an virtual monitor mode. We conclude accurate medium occupied time measurement system from various validation methods.
Implement of Knocking diagnostic algorithm and design of OBD-II Diagnostic system S/W on common-rail engine
Kim, Hwa-Seon ; Jang, Seong-Jin ; Nam, Jae-Hyun ; Jang, Jong-Yug ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2446~2452
DOI : 10.6109/jkiice.2012.16.11.2446
In order to meet the recently enhanced emission standards at home and abroad, it is necessary to develop the CRDI ECU control algorithm that users can adjust fuel injection timing and amount in response to their needs. Therefore, this study developed the simulator for knocking analysis that enables knocking discrimination and engine balance correction applicable to the ECU exclusive to the industrial CRDI engine. The purpose of this study is to provide the driver-oriented diagnostic service that enable drivers to diagnose vehicles directly by developing diagnostic devices for vehicles with ths use of the results of the developed simulator for knocing analysis according to the OBD-II standards. For this purpose, this study aims to improve the fuel efficiency of vehicles by proposing the S/W design method of the OBD-II diagnosis device that can provide real-time communcations with the use of wired system and bluetooth module as a wireless system to send and recevice automobile fault diagnosis signal and sensor output signal, and to suggest an improvement for engine efficiency by minimizing the generation of harmful exhaust gas.
Adaptive thresholding for two-dimensional barcode images using two thresholds and the integral image
Lee, Yeon-Kyung ; Yoo, Hoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2453~2458
DOI : 10.6109/jkiice.2012.16.11.2453
In this paper, we propose an adaptive thresholding method to binarize two-dimensional barcode images. Adaptive thresholding methods that minimize light effects convert an original image into a binary image. The methods are applied to document image binarization. The methods, however, have problems of determining box size used in adaptive thresholding. thus, they inappropriate to use in recognition of two-dimensional barcode images. To overcome the problem, we analysis the problem and propose a new adaptive threshold method using the integral image. To show the effectiveness of our method, we compared our method with the well-known existing methods in terms of visual quality and processing time. The experimental result indicates that the proposed method is superior to the existing method.
A Study on Security Measure of Step-Wise Project
Shin, Seong-Yoon ; Jang, Dai-Hyun ; Kim, Hyeong-Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2459~2464
DOI : 10.6109/jkiice.2012.16.11.2459
Many companies has led to the damage case being leaked to personal information by taking cyber attack. Also, planned hacking cases continues to increase for the purpose of acquiring monetary gain or causing social disruption induction, etc. Approximately 75% of the Web site attacks exploit the vulnerability of the application. Major security issue is to strengthen the S/W development security according to the legal basis. The members of the project team is the fact that the lack of recognition of application development security. In addition, passive response and security validation/testing, etc. throughout the SDLC to the entire area is insufficient. Therefore, rework due to the belated discovery of a defect has occurs. In this paper, we examine the case of the project step-by-step security activities by performing IT services companies. And, through this, we present security measures that can be applied to the step-wise real-world projects.
Fast Decoding Method of Distributed Video Based on Modeling of Parity Bit Requests
Kim, Man-Jae ; Kim, Jin-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2465~2473
DOI : 10.6109/jkiice.2012.16.11.2465
Recently, as one of low complexity video encoding methods, DVC (Distributed Video Coding) scheme has been actively studied. Most of DVC schemes exploit feedback channel to achieve better coding performances, however, this causes these schemes to have high decoding delay. In order to overcome these, this paper proposes a new fast DVC decoding method using parity-bit request model, which can be obtained by using bit-error rate, sent by encoder with motion vector, which is transmitted through feedback channel by decoder after generating side information. Through several simulations, it is shown that the proposed method improves greatly the decoding speed, compared to the conventional schemes.
Zooming fuzzy logic controller for sensorless vector control of an induction motor in low speed region under 3Hz
Han, Sang-Soo ; Choi, Sung-Horn ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2474~2479
DOI : 10.6109/jkiice.2012.16.11.2474
A sensorless vector control of an induction motor provides a good performance in the middle and high speed region. However, in the low speed region, it is very difficult to implement the sensorless vector controller because the feeding voltage measured by the motor is very low. In this paper, to improve the performance of a sensorless vector control of an induction motor in the low speed region under 3Hz, we proposed the fuzzy logic controller using the zooming algorithm. To verify the performance of the proposed controller, an experiment has been performed.
Design of the Voltage Controlled Oscillator for Low Voltage
Lee, Jong-In ; Jung, Dong-Soo ; Jung, Hak-Kee ; Yoon, Young-Nam ; Lee, Sang-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2480~2486
DOI : 10.6109/jkiice.2012.16.11.2480
The design of low voltage LC-VCO(LC Voltage Controlled Oscillator) has been presented to optimize the phase noise and power consumption for the block of frequency synthesis to satisfy WCDMA system specification in this paper. The parameters for minimum phase noise has been obtained in the region of design, using the lines of the tuning range and the excess gain in the plane of the inductance and the transconductance of MOS transistor to compensate the loss of LC-tank. As a result of simulation, the phase noise characteristics is -113dBc/Hz for offset of 1MHz. The optimum designed LC-VCO has been fabricated using the process of 0.25um CMOS. As a result of measurement for fabricated chip, the phase noise characteristics is -116dBc/Hz for offset of 1MHz. The power consumption is 15mW, and Kvco is 370MHz/V.
Design of a Thermal Energy Harvesting Circuit with MPPT Control
Yoon, Eun-Jung ; Kim, Su-Jin ; Park, Kum-Young ; Oh, Won-Seok ; Yu, Chong-Gun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2487~2494
DOI : 10.6109/jkiice.2012.16.11.2487
In this paper, a thermal energy harvesting circuit with MPPT control is designed. MPPT(Maximum Power Point Tracking) control function is implemented using the linear relationship between the open-circuit voltage of a thermoelectric generator(TEG) and its MPP voltage. The designed MPPT control circuit traces the maximum power point by periodically sampling the open circuit voltage of a TEG, makes the reference voltages using sampled voltage and delivers the maximum available power to load. Simulation results show that the maximum power efficiency of the designed circuit is 94%. The proposed thermal energy harvesting circuit is designed with
CMOS process, and the chip area except PAD is
Phase-Locked Loop with a loop filter consisting of a capacitor and a charge pump functioned as resistor
Park, Jong-Youn ; Choi, Hyek-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2495~2502
DOI : 10.6109/jkiice.2012.16.11.2495
This paper presents a new structure of phase looked loop (PLL) for replacing a process sensitive resistor in loop filter with an additional charge pump (CP). The additional charge pump works as a resistor in a loop filter. The output of two charge pumps changes same direction according to process variation. The simulation results according to process conditions(SS/TT/FF) demonstrate that the proposed PLL works properly with process variations. It has been designed with a 1.8V
CMOS process and proved by simulation with HSPICE.
A Design of High Performance Operation Intra Predictor for H.264/AVC Decoder
Jin, Xianzhe ; Ryoo, Kwangki ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2503~2510
DOI : 10.6109/jkiice.2012.16.11.2503
This paper proposes a parallel operation intra predictor for H.264/AVC decoder. In previous intra predictor design, common operation units were designed for 17 prediction modes in order to compute more effectively. However, it was designed by analyzing the equation applied to one pixel. So, there are four operation units for computing 16 pixels in a
block and they need four cycles. In this paper, the proposed intra predictor contains T3(Three Type Transform) operation unit for parallel operation. It divides 17 modes into 3 types to calculate 16 pixels of a
block in only one cycle and needs 16 cycles minimum in 16x16 block. As the result of the experiment, in terms of processing cycle, the performance of proposed intra predictor is 58.95% higher than the previous one.
Deviation of Threshold Voltages for Conduction Path of Double Gate MOSFET
Jung, Hakkee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2511~2516
DOI : 10.6109/jkiice.2012.16.11.2511
This paper have analyzed the change of threshold voltage for conduction path of double gate(DG) MOSFET. The threshold voltage roll-off among the short channel effects of DGMOSFET have become obstacles of precise device operation. The analytical solution of Poisson`s equation have been used to analyze the threshold voltage, and Gaussian function been used as carrier distribution to analyze closely for experimental results. The threshold voltages for conduction path have been analyzed for device parameters such as channel length, channel thickness, gate oxide thickness and doping concentration. Since this potential model has been verified in the previous papers, we have used this model to analyze the threshold voltage. Resultly, we know the threshold voltage is greatly influenced on the change of conduction path for device parameters of DGMOSFET.
An Efficient Hardware Implementation of ARIA Block Cipher Algorithm Supporting Four Modes of Operation and Three Master Key Lengths
Kim, Dong-Hyeon ; Shin, Kyung-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2517~2524
DOI : 10.6109/jkiice.2012.16.11.2517
This paper describes an efficient implementation of KS(Korea Standards) block cipher algorithm ARIA. The ARIA crypto-processor supports three master key lengths of 128/192/256-bit and four modes of operation including ECB, CBC, OFB and CTR. A hardware sharing technique, which shares round function in encryption/decryption with key initialization, is employed to reduce hardware complexity. It reduces about 20% of gate counts when compared with straightforward implementation. The ARIA crypto-processor is verified by FPGA implementation, and synthesized with a
CMOS cell library. It has 46,100 gates on an area of
and the estimated throughput is about 1.28 Gbps at 200 MHz@1.2V.
A Study on the Process Conditions Optimization for Al-Cu Metal Line Corrosion Improvement
Mun, Seong Yeol ; Kang, Seong Jun ; Joung, Yang Hee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2525~2531
DOI : 10.6109/jkiice.2012.16.11.2525
Al-Cu alloy has been used as a circuit material for its low resistance and ease to process for long years at CMOS technology. However, basically metal is very susceptible to corrosion and which has been a long pending trouble in various fields using metal. The defect causes the reliability concerns, so improved methods are necessary to reduce the defect. In the various corrosion parameters, PR strip process conditions after metal etch and optimal cleaning solutions are controllable and increase the process margin to prevent the metal corrosion. This study proposes that chlorine residue after metal etch as the source of metal corrosion, and charges should be removed by optimizing PR strip process condition and cleaning condition.
Global Positioning Function of Around-View Monitoring System based on Car PC
Jang, Si-Woong ; Seo, Sang-Uk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2532~2537
DOI : 10.6109/jkiice.2012.16.11.2532
In recent, the researches on driver assistance systems have been actively performed with development of vehicle industry. AVM(Around View Monitoring) Systems, a part of these systems, have been researching and developing. Existing AVM systems have been developed in the forms of embedded systems or a SoC (System on Chip) to provide view around vehicle in real time. However, if Car PC is equipped with in vehicle, AVM can be developed using only software without additional cost. In this study, we implemented AVM system which provides location information by adding the informations such as latitude, longitude and speed to functions of "Car PC" based AVM system. If storing function is added to the AVM system implemented in this study which provides location information, the system with storing function can be used as AVM black box system.
Extraction of Vessel Width in Coronary Angiography Images
Kim, Seong-Hu ; Lee, Ju-Won ; Kim, Joo-Ho ; Choi, Dae-Seob ; Lee, Gun-Ki ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2538~2543
DOI : 10.6109/jkiice.2012.16.11.2538
The Percutaneous Coronary intervention is a typical way of testing which could be performance to treat a stenosed region by inserting a stent using catheter. In this case, choosing the best stent amongst various kinds of stent for performing an intervention is the most difficult process. For the reason, a width of the blood vessel which is stenosed must be correctly measured to help an operator choose right size of stent. So based on pixel, a width of the blood vessel measured by using the way of Euclidean distance after designing a center-line of vessel from a certain point assigned by operator is shown as a profile in this study. This study would be used as a goof reference for operators when choosing right size of stent.
A Development and Analysis of the Assessment Metrics for Text/Visual Programming Education Using LabVIEW
Lho, Young-Uhg ; Jung, Min-Po ; Cho, Hyuk-Gyu ; Jung, Deok-Gil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2544~2549
DOI : 10.6109/jkiice.2012.16.11.2544
The computer programming education is very important to study the related subjects in computer science, and also in the technology education for the students finding employment. In this paper, we develop the assessment metrics to evaluate and apply the textual and visual programming in the computer education. Also, we analyze the validity for the programming languages and tools for the education and getting job of students, and choose the appropriate programming language/tool for programming education. And, we develop the curriculum for programming education, finally apply and analyze in computer education of university. Especially, we compare and analyze the effectiveness for the text based programming language(JAVA) and visual programming language/environment(LabVIEW) in the area of embedded/mobile/Web programming fields which are necessary in the related industry to the recent trend of IT technology.
Localized Positioning method for Optimal path Hierarchical clustering algorithm in Ad hoc network
Oh, Young-Jun ; Lee, Kang-Whan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2550~2556
DOI : 10.6109/jkiice.2012.16.11.2550
We proposed the energy-efficient routing algorithm ALPS (Ad hoc network Localized Positioning System) algorithm that is range-free based on the distance information. The routing coordinate method of ALPS algorithm consists of hierarchical cluster routing that provides immediately relative coordinate location using RSSI(Received Signal Strength Indication) information. Existing conventional DV-hop algorithm also to manage based on normalized the range free method, the proposed hierarchical cluster routing algorithm simulation results show more optimized energy consumption sustainable path routing technique to improve the network management.
An research of the error detection method and efficient recovery algorithms in the DNA double helix
Kim, SokeHwan ; Hur, Chang-Wu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2557~2562
DOI : 10.6109/jkiice.2012.16.11.2557
In order to maintain order in the genetic information at cells, it need ongoing monitoring and recovery system. DNA is accomplished by a combination of base pairs, Wrong base pairs is formed with a much more lower frequency than the normal DNA. if it does not modify and was accumulate, the Cells were died. In this study, mistakes of DNA replication and repair of the damaged part was introduced engineering concepts by mimicking DNA repair functions. It was presented recover the complementary part of the previously announced and presented an efficient algorithm at find and recover the complementary part.
A Study on Design Techniques of Gaming Service Architecture with Android-base
Ryu, Chang-Su ; Hur, Chang-Wu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2563~2568
DOI : 10.6109/jkiice.2012.16.11.2563
The growth speed of the industry of national smart phone game service has become faster and the its economical and cultural effect has increased steadily these days. The DB design for data perpetuation in C/S MMO which has accumulated data a lot and many simultaneous plays like smart phone games is very important. This paper, mindful of the operation and the scalability suitable for android OS, by utilizing RDBMS, enabling very short, many transactions, their complexity, and a large amount of game data process, suggests fully-qualified MMORPG game service architecture design techniques widely available for more than online game industries.
Torpedo defense system research using HMS(Hull Mount Sonar) of PCC(Patrol Combat Corvette)
Kim, Hee-Earn ; Kim, Young-Kil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 16, issue 11, 2012, Pages 2569~2574
DOI : 10.6109/jkiice.2012.16.11.2569
HMS(Hull Mount Sonar) equipment mounted on PCC(Patrol Combat Corvette) is suitably designed for active mode, and the specific character of sensor or system is not appropriate for the frequency range to detect a torpedo. In this article, in order to implement the function of detecting torpedoes with HMS of existing PCC, I will analyze the feature of input signals each PCCs and design a circuit to compensate reversely for the input signal in certain frequency. And also, I will suggest the most adequate torpedo defense system suitable for the special operating environment and the characteristic of naval vessels, implementing functions such as AGC of input signal and fixing the frequency range of different input signals per different warships.