Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 17, Issue 12 - Dec 2013
Volume 17, Issue 11 - Nov 2013
Volume 17, Issue 10 - Oct 2013
Volume 17, Issue 9 - Sep 2013
Volume 17, Issue 8 - Aug 2013
Volume 17, Issue 7 - Jul 2013
Volume 17, Issue 6 - Jun 2013
Volume 17, Issue 5 - May 2013
Volume 17, Issue 4 - Apr 2013
Volume 17, Issue 3 - Mar 2013
Volume 17, Issue 2 - Feb 2013
Volume 17, Issue 1 - Jan 2013
Selecting the target year
Diffraction Characteristics in Wireless Environment by using the FDTD Method
Kim, Tae Yong ; Lee, Hoon-Jae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1259~1265
DOI : 10.6109/jkiice.2013.17.6.1259
In wireless environment such as wireless LAN, proper location of wireless LAN AP allows us to take an effective coverage to provide good wireless communication service. To simulate wireless environment, FDTD formulation is introduced and Gaussian pulse injection in grid space is considered to be replaced wireless LAN AP. So structural effect corresponding to location of arbitrary obstacle must be considered, and its received gain is estimated. An obstacle in scattering field should be modeled to be conductor and concrete wall and its diffraction effect for some cross wall is evaluated between transmitter and receiver point.
Estimation of the Number of Cell Sites for Nationwide Public Protection and Disaster Relief Network Using WiBro and LTE Technical Methods
Song, Ki-Hong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1266~1272
DOI : 10.6109/jkiice.2013.17.6.1266
This paper calculates estimated number of cell sites to build a nationwide PPDR(Public Protection and Disaster Relief) network of WiBro and LTE technical methods through a link budget calculation, presents the efficient technical method through a comparison between the number of cell sites using WiBro and LTE. As a calculation results, the number of cell sites using WiBro method are larger than twice compared to that of LTE method on the same frequency bands, due to the differences of uplink PAPR, uplink transmission technique and SINR. On the basis of the result, LTE mothod is considered as a more effective technology than the WiBro method on the economic, technical and marketing points of views on building a nationwide network.
Nonlinear System State Estimating Using Unscented Particle Filters
Kwon, Oh-Shin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1273~1280
DOI : 10.6109/jkiice.2013.17.6.1273
The UKF algorithm for tracking moving objects has fast convergence speed and good tracking performance without the derivative computation. However, this algorithm has serious drawbacks which limit its use in conditions such as Gaussian noise distribution. Meanwhile, the particle filter(PF) is a state estimation method applied to nonlinear and non-Gaussian systems without these limitations. But this method also has some disadvantages such as computation increase as the number of particles rises. In this paper, we propose the Unscented Particle Filter (UPF) algorithm which combines Unscented Kalman Filter (UKF) and Particle Filter (PF) in order to overcome these drawbacks.The performance of the UPF algorithm was tested to compare with Particle Filter using a 2-DOF (Degree of Freedom) Pendulum System. The results show that the proposed algorithm is more suitable to the nonlinear and non-Gaussian state estimation compared with PF.
Extraction of Appendix from Ultrasonographic Images using Ends-in Search Stretching and Fuzzy Sigma Binarization
Kim, Kwang-Baek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1281~1285
DOI : 10.6109/jkiice.2013.17.6.1281
In this paper, we propose a method to extract the area of appendix from ultrasonographic image via computational vision. A series of image processing techniques such as Ends-in search stretching for enhancing the brightness contrast, block binarization, grassfire algorithm for extracting lower part of fascia, and fuzzy sigma binarization method to finalize the appendix area are used to achieve our goal. The strength of this paper is using fuzzy sigma binarization instead of other binarization technique to handle the sensitivity of extracting the target area from regio hypogastrica. The experiment verifies the efficacy of the proposed method successfully.
Antenna Selection Scheme for BD Beamforming-based Multiuser Massive MIMO Communication Systems
Ban, Tae-Won ; Jung, Bang Chul ; Park, Yeon-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1286~1291
DOI : 10.6109/jkiice.2013.17.6.1286
Intensive researches on multiuser-based Massive MIMO are performed to increase the spectral efficiency. Although the Massive MIMO scheme based on huge number of antennas inevitably causes hardware and computational complexity in baseband and radio frequency (RF) elements, the problem can be mitigated without serious performance degradation by limiting the number of baseband and RF elements below the number of transmit antennas of base station and opportunistically selecting transmit antennas according to channel states. Accordingly, this paper proposes a simple antenna selection scheme for multiuser-based Massive MIMO systems.
The Implementation of Idle Stop System with the OBD-II Interface in the Automotive Smart Key System
Kim, Kyeong-Seob ; Lee, Yong-Hoon ; Lee, Yun-Seob ; Choi, Sang-Bang ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1292~1305
DOI : 10.6109/jkiice.2013.17.6.1292
Along with the strengthening vehicle environmental regulations and the growing needs for the energy consumption reduction technology, the researches on the engine idle stop system, have been briskly carried out around the automobile manufacturers before the development of alternative energy. Furthermore, there is a movement to disseminate the environment friendly idle stop system by combining the system to the generalized smart key system to not only increase purchasing but also provide the convenience and save the energy as well. In this paper, we designed and implemented the idle stop system algorithm for the aftermarket smart key system with the OBD-II interface. The implemented start stop system is capable of controlling two independent systems, the smart key system and intelligent idle stop system, on a single ECU. In addition, the implemented start stop system standardizes the communication interface with the vehicles to reduce the time required for installing the start stop system to the various vehicles, and satisfies every standard response time limit for the vehicle status request signals.
Integration wireless network approach OBD-II connector for reading vehicle driving information
Baek, Sung-Hyun ; Jang, Jong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1306~1311
DOI : 10.6109/jkiice.2013.17.6.1306
Driver for safety always check the status of their vehicle, and it is essential to understand. When driver know vehicle driving status, there is know vehicle driving status to use vehicle realtime control data by OBD-II of vehicle network and connected OBD-II connector. But, connector to receive OBD-II data differ each communication connection method to connect smart device.(such as smartphone, blackbox, EDR) if vehicle driver change another smart device from smart device(such as android -> iphone, iphone -> android), vehicle driver exist the inconvenience that purchase new OBD-II connector. in this paper, As make up for the fault, there is to implement one OBD-II connector that integrate Bluetooth, Wifi, WCDMA module. as result, anything smart device was notified realtime vehicle control data through implemented one OBD-II connector in this paper
Design of Clock Synchronization Scheme for Pseudolite
Lee, Ju Hyun ; Hwang, Soyoung ; Yu, Dong-Hui ; Lee, Sang Jeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1312~1317
DOI : 10.6109/jkiice.2013.17.6.1312
Pseudolite is a contraction of the term "pseudo-satellite", used to refer to something that is not a satellite which performs a function commonly in the domain of satellites. Pseudolite are most often small transceivers that are used to create a local, ground-based GPS alternative. Pseudo-range measurement of pseudolite has around 300m range error, when time synchronization error of
occurs. Therefore the time synchronization methods play an important part in navigation augmentation using pseudolite. This paper proposes three clock synchronization methods that are installation method of pseudolite station, method using KRISS-UTC and method using PRN code phase difference for pseudolite. The simulation platform structure is presented for evaluating proposed clock synchronization performance.
Performance Comparison of Opportunistic Spectrum Access Schemes in Non-slotted Cognitive Radio Networks Through Simulation Research
Lee, Yutae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1318~1323
DOI : 10.6109/jkiice.2013.17.6.1318
We consider the design of opportunistic spectrum access schemes where secondary users can opportunistically access unused spectrum in non-slotted primary systems. Two non-slotted spectrum sensing and access schemes for secondary users are considered. We present experimental results that demonstrate the performance of the considered schemes.
SoQ-based Relay Transmission Protocol for Wireless USB over WiMedia D-MAC
Hur, Kyeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1324~1329
DOI : 10.6109/jkiice.2013.17.6.1324
The WiMedia Alliance has specified a Distributed Medium Access Control (D-MAC) protocol based on UWB for high speed wireless home networks and WPANs. In this paper, firstly, the fair SoQ-based Distributed Reservation Protocol (DRP) for D-MAC is analyzed. And a novel SoQ-based relay transmission protocol is proposed to overcome DRP conflicts fast. In the proposed protocol, each device executes the Satisfaction of QoS (SoQ) time slot allocation algorithm independently. And, in order to give the loser device due to DRP conflicts another chance to maintain QoS resources, the proposed relay transmission protocol helps the device reserve another indirect link maintaining the required QoS resources via a relay node.
The USB Multi-signal Transmission System
Chae, Jung-Sik ; Kim, A-Yong ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1330~1335
DOI : 10.6109/jkiice.2013.17.6.1330
In recent years, the need to simultaneously transmit a variety of signals, such as DVI(Digital Visual Interface), audio, video, USB(Universal Serial Bus), LAN from the computer is required. So the cable complexity and scalability issues have been raised. In this paper, this signal can be distributed using a single USB cable, computer, video, audio, USB, LAN, one USB multi-signal transmission system was designed and implemented. USB multi-signal transmission was implemented in order to convert a single DVI, audio, and multiple USB, LAN, USB signal converter modules. This USB DVI port supports up to 1920 * 1080 resolution. USB multi-signal transmission system by sending multiple signals into a single cable installation costs of the various cable and using the replication feature of the screen, will provide schools and institutes, etc., providing the convenience of the river, and the scalability of computer peripheral ports.
An Analysis for the Characteristics of Digital TVs in CES in the View of Technology Growth and Substitution Curves
Kim, Do-Goan ; Shin, Seong-Yoon ; Jin, Chan-Yong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1336~1341
DOI : 10.6109/jkiice.2013.17.6.1336
Through reviewing the characteristics of digital TVs, which have emerged in CES since 2005, in the view of technology growth and substitution curves, this paper is to provide a prediction on the next generation's multi-media on smart environment. As a result, digital TV has been developed on the flow of its technology growth curve from the early version in 2005 to smart digital TV in 2013, which emphasizes the key word "connected", and it has already come to the market puberty.
Extraction of Aesthetic Measure from Various Stabilized Image
Shin, Seong-Yoon ; Lee, Hyun-Chang ; Rhee, Yang-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1342~1347
DOI : 10.6109/jkiice.2013.17.6.1342
Color harmony of Moon and Spencer is based on the Munsell color harmony theory. This harmony theory is established in the three of harmony and disharmony, the harmony of the area of effect, and Aesthetic Measure of harmony and disharmony. Aesthetic Measure here is how to obtain the quantitative expression of the degree of harmony. American scholar Burkhoff were analyzed with the proposition that beauty of Moon-Spencer is with the order in complexity. In this paper, the good and bad of coloration was divide elements of the order and the complexity. Aesthetic Measure is divided into elements of the complexity from elements of the order. This is utilized in the calculation shown in the various image, problem of color harmony and disharmony, which is treated as a sensibility was calculated by numerically. Thus Aesthetic Measure show was good or bad coloration by determining the color in the various image.
Design of Integrated Security Framework for Open Wireless Networking Architecture
Kim, Jung Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1348~1353
DOI : 10.6109/jkiice.2013.17.6.1348
The increasing demand of users for various wireless communication services has lead to the development with uniting co-existence of different and wireless networks. Each one of the these wireless networks has its own unique characteristics, as compared to other networks. An integrated security mechanism is one of the key issue in the open wireless network. To realize overall security mechanism in open wireless architecture, we should provide practical workable framework for the realization of the integrated security challenges. In this paper, we analysed integrated security platform and considerations based on the security concept.
The Multimedia Contents Search System based on Ontology
Hwang, Chi-Gon ; Moon, Seok-Jae ; Lee, Daesung ; Yoon, Chang-Pyo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1354~1359
DOI : 10.6109/jkiice.2013.17.6.1354
With the development of multimedia and network technology, the production of multimedia contents is rapidly increasing. Meanwhile, the technology to search and use the contents is still insufficient. There are standards for multimedia contents to address the problem, but they cannot fully support diverse multimedia data types or ensure their interoperability. In this paper, an ontology-based content search system is proposed to ensure the interoperability of multimedia contents. The ontology is configured by presenting the rules for it using the schema structure of the multimedia description scheme (MDS) of MPEG-7. Based on this ontology, This paper extend multimedia relationship based on ontology, thus established the semantic retrieval system.
Extraction of Forensic Evidence and Hacking Attacks about IP-PBX
Park, Dea-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1360~1364
DOI : 10.6109/jkiice.2013.17.6.1360
Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LGU+) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.
u-Healthcare Monitoring System Design using by Smartphone based on Bluetooth Health Device Profile
Cho, Kyoung-Lae ; Kim, Sang-Yoon ; Kim, Jung-Han ; Oh, Am-Suk ; Kim, Gwan-Hyung ; Jean, Jae-Hwan ; Kang, Sung-In ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1365~1369
DOI : 10.6109/jkiice.2013.17.6.1365
Recently, the Personal Health Device(PHD) that measures various biometric data easily are highlighted for ensuring portability, scalability and interoperability among the device as well as needs for a standardization of managing information measured by. In this paper, we'd like to propose u-healthcare monitoring system that measure biometric data(Oxygen saturation, Body weight, ECG and Blood pressure) by PHD featured with transferring data into devices such as smartphone using Bluetooth Health Device Profile(HDP) based on the ISO/IEEE 11073.
The Study on Indoor Localization for Robots following Human using Vision Applications
Jun, Bong-Gi ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1370~1374
DOI : 10.6109/jkiice.2013.17.6.1370
The suitcase can follow its owner all on its own via the Bluetooth connectivity in your phone. A robotic vacuum cleaner than can understand voice commands and even follow homeowner. Robots are used in a variety of applications such as a robot wheelchair. In this paper, I focus the problem of automatic return to the base in the process of developing the moving robot for loading things. In this paper, I propose the indoor localization method which is able to determine the position of the robot in the building by using image processing techniques.
SyncNote: A Shared Whiteboard Android Application Supporting the XMPP
Jin, Jae-Hwan ; Park, Jongmoon ; Lee, Myung-Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1375~1382
DOI : 10.6109/jkiice.2013.17.6.1375
A shared whiteboard provides a drawing workplace that can be shared with peoples in real time. Since it supports rich drawing mechanisms for collaboration or communication, it is used as an effective tool in group work such as virtual meeting. In this paper, we present an XMPP client application named SyncNote that supports the shared whiteboard facility. For this, we propose an extension of the open standard communication protocol XMPP to provide the shared whiteboard facility. The SyncNote application runs on the Android platform, providing effective communication through sharing the drawings and images created by a group of users.
Design and Implementation of Convergence Point Adjustment Method for Zoom-In
Ha, Jong-Soo ; Kim, Dae-Woong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1383~1388
DOI : 10.6109/jkiice.2013.17.6.1383
Even though a dual lens stereoscopic camera allows for convenient stereoscopic photography, the necessity for the research comes up, since the dual lens stereoscopic camera can cause visual discomfort during zoom-in due to the fixed convergence point. We propose a method based on which a convergence point can be adjusted to prevent visual discomfort during zoom-in for a dual lens stereoscopic camera. First, the relational model is classified into nine kinds and defined, depending on locations of focus, object, and convergence point. And then, the method to minimize visual discomfort is suggested by adjusting convergence point on the given model. We also implement the suggested methods with anaglyph computer graphic and demonstrate the superiority of them.
Design and Implementation of a Mobile Web Services for Supporting Dormitory Works
Kim, Sung Wan ; Son, Byeong-Oh ; Cho, Yang-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1389~1398
DOI : 10.6109/jkiice.2013.17.6.1389
With the rapid increase in supplying and applying of mobile devices major student services in colleges are provided in mobile device-based ones. In this paper we describe a design and implementation of a dormitory works supporting service system based on mobile web to efficiently assist dormitory business and provide student convenient services especially for dormitory type public schools and colleges requiring a strict student management. The proposed system, first, improves the effectiveness of work processing, such as roll call, sleep out handling, in the aspect of business management. Second students satisfaction level is increased as giving them access under Web by providing mobile web environment. We operated the proposed system over a college dormitory living around 250 students for a semester and evaluated its usefulness by conducting a questionnaire survey.
Weighted Integral H
Control of Induction Motor using T-S fuzzy
Kim, Min-Chan ; Park, Seung-Kyu ; Yoon, Tae-Sung ; Kwak, Gun-Pyong ; Ahn, Ho-Gyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1399~1408
DOI : 10.6109/jkiice.2013.17.6.1399
This paper proposes a new
T-S fuzzy controller with a novel integral control for induction motors which have nonlinear dynamics. The
T-S fuzzy controller is used for the nonlinearity and robustness and weighted integral is used for tracking problem and control performance. A T-S Fuzzy controller is the fuzzy combination of local linear controllers considering the overall stability, and LMI(Linear Matrix Inequlity) is used for determining the gains of linear controllers. The tracking problem of an induction motor is changed into regulator problem by introducing the integral control technique with weighting factor, diminishing the conservatism of
T-S fuzzy controller.
Analysis of Subthreshold Current Deviation for Channel Doping of Double Gate MOSFET
Jung, Hakkee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1409~1413
DOI : 10.6109/jkiice.2013.17.6.1409
This paper analyzed the change of subthreshold current for channel doping concentration of double gate(DG) MOSFET. Poisson's equation had been used to analyze the potential distribution in channel, and Gaussian function had been used as carrier distribution. The potential distribution was obtained as the analytical function of channel dimension, using the boundary condition. The subthreshold current had been analyzed for channel doping concentration, and projected range and standard projected deviation of Gaussian function. Since this analytical potential model was verified in the previous papers, we used this model to analyze the subthreshold current. As a result, we know the subthreshold current was influenced on parameters of Gaussian function and channel doping concentration for DGMOSFET.
An analysis of UAV line-of-sight according to mission environment
Choi, Jun-Su ; Hur, Chang-Wu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1414~1418
DOI : 10.6109/jkiice.2013.17.6.1414
In this paper, analyzed of UAVs operation altitude and range from the point of view of the data link. UAVs operation altitude is determined by the specification of the mission equipment and operational purposes. The link-of-sight analysis of data link equipment before deciding the unmanned aircraft operation altitude conditions should be considered. If GDT=0m installation then 32dBi antenna apply 15,779 meter is operation altitude. 44dBi antenna 7,927 meters. Operating altitude perspective, high-gain antenna is recommended of the long range communication.
New MAC Protocol and Dynamic Bandwidth Allocation Method for TWDM PON
Han, Man-Soo ; Na, Cheol-Hun ; Kang, Seong-Jun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1419~1424
DOI : 10.6109/jkiice.2013.17.6.1419
Passive optical networks (PONs) are the emerging solution for access networks since PONs provide high bandwidth and the low operation cost. In recent, the new solution in access networks is TWDM PON which is a mixture of WDM (wavelength-division multiplexing) and TDM (time-division multiplexing). This paper proposes a new MAC (media access control) protocol for TWDM PON. In addition, this paper proposes and evaluates a new dynamic bandwidth allocation method for TWDM PON.
High Total Dose Radiation Effects on Fiber Bragg Grating Sensors
Kim, Jong-Yeol ; Lee, Nam-Ho ; Jung, Hyun-Kyu ; Kim, Youngwoong ; Han, Won-Taek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1425~1431
DOI : 10.6109/jkiice.2013.17.6.1425
We have measured the radiation-induced Bragg wavelength shift (BWS) of fiber Bragg grating (FBG) which was inscribed in Ge-doped core silica using a phase mask during irradiation up to a dose of 23 kGy and annealing effects after the gamma-exposure. For packaged FBG sensors, we observed the maximum radiation-induced BWS of about 91 pm during irradiation. Packaged FBG sensors also show higher radiation sensitivity above nearly a factor of two than non-packaged type sensor in the same condition.
The Improvement Method of Internet Ethics Education for the Prevention of Internet Aftereffect
Lee, Yun Bae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1432~1440
DOI : 10.6109/jkiice.2013.17.6.1432
In spite of advantages to using internet, but there are many adverse effects. The most well-known negative effects include internet addiction, personal information infringement, copyright violation, spread of harmful information, cyber bullying, online fraud, hacking and virus distribution, and online prostitution. Until now, the government and public organization strived to prevent and reduce the negative effects but have faced limitations. In accordance with, one of the measures the solve the problems caused by internet is to strengthen the internet ethics education. This study aims to consider and analyze the negative effects of internet and provide measures to promote internet ethics education to prevent and reduce such effects.
Establish the Foundation for Development of Elder Driver Friendly Smart Cluster
Kim, Min ; Kim, Gwan-Hyung ; Kim, Hyun-Hee ; Byun, Gi-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1441~1448
DOI : 10.6109/jkiice.2013.17.6.1441
The propose of this study is to apply establish the foundation for development of elder driver friendly smart cluster. At first, vehicle dashboard trends were analyzed. Secondly, we presents the structure of elder driver friendly smart cluster and explains android based meter cluster. also, we shows the implementation details and experimental result of elder driver friendly smart cluster system. And we presents a summary and conclusions.
Effect of experience quality of participant in the leisure marine sports : Effect of satisfaction and Immersion on Reparticipation motive - Moderating effect of pre-experiencing yacht race -
Jang, Jae-Hun ; Leem, Cheol ; Kim, Sun-Mi ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1449~1461
DOI : 10.6109/jkiice.2013.17.6.1449
In this study, We analyzed whether the quality of marine leisure sports experience have effects on participants satisfaction, immersion and 5motive for reparticipation. We also investigated effect of participants' pre-experience of participating race on satisfaction, immersion and motive for reparticipation. Sense of freedom and social interaction appeared to affect satisfaction of participants significantly, but the sense of control did not. Sense of freedom had effect on immersion, whereas sense of control and social interaction had no effect on immersion. Significant relationship between motive for reparticiaption and participants' satisfaction and immersion was observed. Interaction effect between participant's satisfaction and was significant. Immersion mediates relation between reparticiaption and participants' satisfaction, participants experienced yahct race before showed more effect of satisfaction on motive for reparticiaption than participants with no race experience, who showed no significant effect of satisfaction on motive for reparticiaption. Immersion have effect on motive for reparicipation in both groups, but effect size was greater in the group with race experience. Thus, satisfaction and immersion of participants who have pre-experience of participating race showed greater effect on reparticipation than who haven't.
A Design of SWAD-KNH Scheme for Sensor Network Security
Jeong, Eun-Hee ; Lee, Byung-Kwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1462~1470
DOI : 10.6109/jkiice.2013.17.6.1462
This paper proposes an SWAD-KNH(Sybil & Wormhole Attack Detection using Key, Neighbor list and Hop count) technique which consists of an SWAD(Sybil & Wormhole Attack Detection) module detecting an Worm attack and a KGDC(Key Generation and Distribution based on Cluster) module generating and an sense node key and a Group key by the cluster and distributing them. The KGDC module generates a group key and an sense node key by using an ECDH algorithm, a hash function, and a key-chain technique and distributes them safely. An SWAD module strengthens the detection of an Sybil attack by accomplishing 2-step key acknowledgement procedure and detects a Wormhole attack by using the number of the common neighbor nodes and hop counts of an source and destination node. As the result of the SWAD-KNH technique shows an Sybil attack detection rate is 91.2% and its average FPR 3.82%, a Wormhole attack detection rate is 90%, and its average FPR 4.64%, Sybil and wormhole attack detection rate and its reliability are improved.
A Study on e-PBL System for Improvement of Self-Directed Learning Ability
Seo, Seong-Won ; Kim, Eui-Jeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1471~1476
DOI : 10.6109/jkiice.2013.17.6.1471
This research examines how PBL(Problem-based Learning; PBL) system affects to 'Self-directed learning ability', by developing and applying it to the participants of "Science Cyber Conference" - the web based on-line debating learning program - among those students of the Affiliated Institute of Science gifted education of K University, for 16weeks. With this, also the cognizance of learners for the PBL class process are looked into together. After conducting the program applied with the web-based PBL strategy, the participants 'Self-directed learning ability' showed the remarkable change statistically (p<.05). Especially it showed the meaningful changes in six sections (p<.05), among those subdivided seven sections of 'Self-directed learning ability', with the one exception, 'Self-confidence as a Learner'. They also showed the positive response to the class which adopted the web-based PBL strategy.
Development of Position Recognition System by Wireless Communication
Sohn, Jong-Hoon ; Hwang, Gi-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1477~1486
DOI : 10.6109/jkiice.2013.17.6.1477
In this paper, Implementation of location estimation system using wireless communication technology based on Zigbee. Using wireless communication technology, calculation more accurate location information and service location information to the H/W and S/W has been developed. Receivers, repeaters, smart tag(location device), was developed for implement a location estimation system. The smart tag is built the 120~130KHz, 13~14MHz, 2.0~3.0GHz radio frequency tag. Receiver and repeater is applied to the tag module to recognize the location device's active RFID tags transmit a wireless signal for tag identification. Common Entrance control system in contact with a smart tag, It was implemented to transfer the value of the tag to the access control server over a LAN.
Accuracy Analysis of Time Synchronization in Wireless Sensor Networks
Hwang, Soyoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1487~1495
DOI : 10.6109/jkiice.2013.17.6.1487
Time synchronization is a prerequisite in wireless sensor network applications such as object tracking, consistent state update, duplication detection, and temporal order delivery. This paper analyze time synchronization accuracy of pair-wise time synchronization algorithm which is a typical time synchronization model of time synchronization method in wireless sensor networks. In addition, the analyzed results are verified by simulations. These results can be utilized for performance improvement or development of time synchronization in wireless sensor networks.
A Fairness Based T-MAC Protocol in Wireless Sensor Network
Nam, Jaehyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1496~1501
DOI : 10.6109/jkiice.2013.17.6.1496
IEEE 802.11 has become the main technology in wireless network. However, performance anomalies, especially in terms of fairness, arise in its use in ad hoc networks. Two independent emitters nodes can easily monopolize the medium, preventing other nodes to send packets. This paper proposes the modified (m,k)-firm scheme which is based on T-MAC to improve fairness. The basic idea is to assign higher priorities to nodes that are closer to a dynamic failure so as to improve their chances of meeting their deadlines. The simulation result shows that the proposed scheduling scheme helps improve the fairness of the DCF.
An Ecological Psychology of Gameplay : Case Study of Smart Phone App Game
Song, Seung-Keun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1502~1508
DOI : 10.6109/jkiice.2013.17.6.1502
In aspect of HCI(Human Computer Interaction) gameplay is the procedure to solve the problem that gamers encounter in order to generate or discover a new rule to achieve gamers' goal. The goal of this research is to investigate the structure and understand the gameplay in aspect of affordance from ecological psychology rather than the traditional problem solving theory. This research selects App. game based on smart phone. Expert gamers participated in this experiment. We record all gameplay using audio and video device. We conducted protocol analysis as qualitative method based on the verbal report and action protocol during game playing. As result, gameplay based on affordance includes selection and relation. We found that subjects selected one thing at once with attention. Moreover, we found that there were two behaviors : exploratory action and performatory action. We believe that exploration, action, and transformation for affordance appear. The result of this research imply to suggest design guideline for game design methodology when designers develop game.
Implementation of E-Training Contents Authoring System based on HTML5
Kim, Yu-Doo ; Moon, Il-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 17, issue 6, 2013, Pages 1509~1514
DOI : 10.6109/jkiice.2013.17.6.1509
In the distance education system existing, change of content by the content provider has not been performed in real time. But current car model is changed quickly. So it must modifying by contents provider in real-time. In this paper, we implement contents authoring system for modifying E-training contents easily. Especially, it use HTML5 technology. Through it, contents providers can modifying contents in various platforms easily.