Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 18, Issue 12 - Dec 2014
Volume 18, Issue 11 - Nov 2014
Volume 18, Issue 10 - Oct 2014
Volume 18, Issue 9 - Sep 2014
Volume 18, Issue 8 - Aug 2014
Volume 18, Issue 7 - Jul 2014
Volume 18, Issue 6 - Jun 2014
Volume 18, Issue 5 - May 2014
Volume 18, Issue 4 - Apr 2014
Volume 18, Issue 3 - Mar 2014
Volume 18, Issue 2 - Feb 2014
Volume 18, Issue 1 - Jan 2014
Selecting the target year
Design of Broadband Planar Dipole Antenna for Indoor Digital TV Reception
Lee, Jong-Ig ; Yeo, Junho ; Park, Jin-Taek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 497~502
DOI : 10.6109/jkiice.2014.18.3.497
In this paper, a design method for a broadband planar dipole antenna for terrestrial digital television (DTV) reception is studied. The dipole is modified to half bow-tie type for size reduction. The balun between feeding microstrip line and coplanar strip (CPS) line is implemented with a rectangular patch inserted along the center of the CPS line. The proposed antenna is the structure of dual resonances, one is due to the dipole and the other is due to the CPS line attached by the balun. The effects of various geometrical parameters on the antenna performance are examined, and the antenna is designed for terrestrial DTV band (470-806 MHz). The prototype antenna is fabricated on an FR4 substrate with a size of
, and tested experimentally to verify the results of this study.
Design of PID Controller with Adaptive Neural Network Compensator for Formation Control of Mobile Robots
Kim, Yong-Baek ; Park, Jin-Hyun ; Choi, Young-Kiu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 503~509
DOI : 10.6109/jkiice.2014.18.3.503
In this paper, a PID controller with adaptive neural network compensator is proposed to control the formations of mobile robot. The control system is composed of a kinematic controller based on the leader-following robot and dynamic controller for considering the dynamics of the mobile robot. The dynamic controller is constituted by a PID controller and the adaptive neural network compensator for improving the performance and compensating the change in dynamic characteristics. Simulation results show the performance of the PID controller and the neural network compensator for the circular trajectory and linear trajectory. And it is verified that by improving the performance of a PID controller via the adaptive neural network compensator, the following robot's tracking performance is improved.
Design of C-shape Sharp Turn Trajectory using Neural Networks for Fish Robot
Park, Hee-Moon ; Park, Jin-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 510~518
DOI : 10.6109/jkiice.2014.18.3.510
In this study, in order to improve and optimize the performance of the turning mechanism for a fish robot in the fluid, we propose the tail joint trajectories using neural networks to mimic the CST(C-shape Sharp Turn) patterns of a real fish which is optimized in the natural environment. In order to mimic the CST patterns of a fish, we convert the sequential recording CST patterns into the coordinate data, and change the numerical coordinate data into a functions. We change the motion functions to the relative joint angles which is adapted to suit robot's shape and data. However, these relative joint trajectories obtained by the sequential recording of the carp have low-precision. It is difficult to apply to the control of a fish robot. Therefore, the relative joint trajectories are interpolated using neural networks with superior generalization ability and applied to the fish robot. we have found that the proposed method using neural networks is superior to ones using high-order polynomial equation through the computer simulations.
Accessing DLNA Network with Cellular Communication Terminals
Kim, Sangrok ; Lee, Hyunseok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 519~525
DOI : 10.6109/jkiice.2014.18.3.519
In this paper, we show a scheme to directly access DLNA network with the 3G/4G communication module of a smartphone in home or office environment. By exploiting this scheme, end users can use DLNA service more conveniently regardless of the type of activated communication module in a smartphone. For the implementation of this scheme, we use a femtocell that is a basestation with small coverage. A problem caused by the IP address hierarch discrepancy between the IP address of 3G/4G module of smartphone and those of local network nodes is resolved by deploying local IP address scheme. The processing of multicasting packet, that is required in DLNA service, is enabled by using IP tunneling scheme. As a result, end user can access DLNA network regardless of the type of activated wireless communication module. We validate the design result by implementing it on a commercial WCDMA femtocell.
Relay Transmission Protocol for Mobility Support in WiMedia Distributed MAC Systems
Hur, Kyeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 526~534
DOI : 10.6109/jkiice.2014.18.3.526
In this paper, for the WiMedia Distributed Medium Access Control (D-MAC) protocol based on UWB. performance degradation due to the Distributed Reservation Protocol (DRP) conflict problem caused by devices' mobility is analyzed. And a DRP relay protocol and a DRP conflict resolution (CR) are proposed to overcome the performance degradation at DRP conflicts. In order to give the loser device at DRP conflicts a chance to maintain resources, the proposed DRP relay protocol executed at each device helps the loser device reserve an indirect link maintaining the required resources via a relay node. Simulation results considering the mobile environment have indicated that the DRP relay combined with the CR prevent the throughput decrease even though mobility of devices increases.
A Suggestion of Baseball Simulation Game Using High Speed Camera Sensor
Kim, Do-Goan ; Jin, Chan-Yong ; Shin, Seong-Yoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 535~540
DOI : 10.6109/jkiice.2014.18.3.535
Due to the recent popularity of sports, business items which combine IT technologies with sports have appeared. 'Sportainment' which combines the elements of sports and entertainment have a lot of potential and development as new business items in the view of overcoming many limitations such as time and place in real sports. For suggesting a baseball simulation game 'sportainment', this paper is to review the technologies in the existing indoor baseball ranges and to provide the possibility of indoor baseball simulation using various sensor technologies. This baseball simulation game is expected to develop as one of successful indoor 'sportainment' businesses such as Golfzon.
Design and Development of Multiple Input Device and Multiscale Interaction for GOCI Observation Satellite Imagery on the Tiled Display
Park, Chan-Sol ; Lee, Kwan-Ju ; Kim, Nak-Hoon ; Lee, Sang-Ho ; Seo, Ki-Young ; Park, Kyoung Shin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 541~550
DOI : 10.6109/jkiice.2014.18.3.541
This paper describes a multi-scale user interaction based tiled display visualization system using multiple input devices for monitoring and analyzing Geostationary Ocean Color Imager (GOCI) observation satellite imagery. This system provides multi-touch screen, Kinect motion sensing, and moblie interface for multiple users to control the satellite imagery either in front of the tiled display screen or far away from a distance to view marine environmental or climate changes around Korean peninsular more effectively. Due to a large amount of memory required for loading high-resolution GOCI satellite images, we employed the multi-level image load technique where the image was divided into small tiled images in order to reduce the load on the system and to be operated smoothly by user manipulation. This system performs the abstraction of common input information from multi-user Kinect motion and gestures, multi-touch points and mobile interaction information to enable a variety of user interactions for any tiled display application. In addition, the unit of time corresponding to the selected date of the satellite images are sequentially displayed on the screen and multiple users can zoom-in/out, move the imagery and select buttons to trigger functions.
A New Watermarking Algorithm for 3D Stereoscopic Image based on Depth and texture images
Seo, Young-Ho ; Kim, Bo-Ra ; Kim, Dong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 551~561
DOI : 10.6109/jkiice.2014.18.3.551
Since the depth and texture images have been widely used for generating 3-dimensional stereoscopic image, the security of them have been focused. In this paper, we propose a new watermarking technique for copyright of stereo and multiview images which is generated in an arbitrary viewpoint by depth and texture image. After the mark space is selected for preserving watermark through DIBR (depth-image-based rendering) process which uses 3D warping, the texture image is transformed to the frequency coefficient using 2D DCT (discrete cosine transform). Some parts of them are quantized, which is the corresponding process to watermarking. The embedded watermark is not conformed by eyes, so we identified the invisibility of the proposed method. In case of appling attacks of general image process, we also identified the robustness of it.
Digital Business Card System based on Augmented Reality
Park, Man-Seub ; Kim, Chang-Su ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 562~568
DOI : 10.6109/jkiice.2014.18.3.562
With the development of computer technology, augmented reality (Augmented Reality, AR) technology in the future, one of the main directions of development of human interface technology is emerging. On augmented reality based on the design and implementation of a digital business card system. In this paper, a Smartphone is simply information through recognizable digital business card contains information about the system. Digital business card system is compared to the way existing hardware in a way visually-based high precision. In addition, registered as a 3D computer vision of augmented reality technology skills and real-world situations convergence technology for research. Future research, 3D electronic map for Smartphone apps as of the application user interface on the side for research is needed.
Wireless Webcam Implementation and Application Utilizing Wireless USB Technology
Chae, Jung-Sik ; Ban, Tae-Hak ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 569~575
DOI : 10.6109/jkiice.2014.18.3.569
These days as smart TVs or android set top boxes have come into wide use, VoIP(Voice over Internet Protocol) services such as the Skype which can beused on computer system, can be also accessed by smart TVs or set top boxes. and the various kinds of distance learning programs have been developed on smart TVs or set top boxes. but when users have utilized a webcam with smart TVs or set top boxes, users have to go in front of smart TVs or set top boxes In this research paper, the new technology can be solved the problem of webcam use according to chaned environment. This tech is related with the wireless webcam one which can be applicable to open spaces such as living room with some distance between user and smart TV. There are few problems in long distance the test results show high reliability in living room with some distance.
The Distributed Encryption Processing System for Large Capacity Personal Information based on MapReduce
Kim, Hyun-Wook ; Park, Sung-Eun ; Euh, Seong-Yul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 576~585
DOI : 10.6109/jkiice.2014.18.3.576
Collecting and utilizing have a huge amount of personal data have caused severe security issues such as leakage of personal information. Several encryption algorithms for collected personal information have been widely adopted to prevent such problems. In this paper, a novel algorithm based on MapReduce is proposed for encrypting such private information. Furthermore, test environment has been built for the performance verification of the distributed encryption processing method. As the result of the test, average time efficiency has improved to 15.3% compare to encryption processing of token server and 3.13% compare to parallel processing.
On Dynamic Voltage Scale based Protocol for Low Power Underwater Secure Communication on Sensor Network
Seo, Hwa-Jeong ; Kim, Ho-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 586~594
DOI : 10.6109/jkiice.2014.18.3.586
Maximizing the operating time by reducing the power consumption is important factor to operate sensor network under water networks. For efficient power consumption, dynamic voltage scaling method is available. This method operates low frequency when there is no workload. In case of abundant workload, high frequency operation completes hard work within short time, reducing power consumption. For this reason, complex cryptography should be computed in high frequency. In this paper, we apply dynamic voltage scaling method to cryptography and show performance evaluation. With this result, we can reduce power consumption for cryptography in under water communication.
Unusual data local access using inverse order tree
Rim, Kwang-Cheol ; Seol, Jung-Ja ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 595~601
DOI : 10.6109/jkiice.2014.18.3.595
With the advent of the Smart information-communication era, the number of data has increased exponentially. Accordingly, figuring out and analyzing in which area and circumstance the data has been created becomes one of the factors for prompt actions. In this paper identifies how to analyze the data by implementing a route from the lowest module to highest one in an inverse order for the part judgement for the particular data. The script first identifies cluster analisys, paralizes the analysis using the sum of each factors of the cluster with the tree structure, and finally transpose the answer into number. Also, it is designed to place priority on particular answer, thereafter, draws the wanted answer real-time.
Light-weight System Design & Implementation for Wireless Intrusion Detection System
Kim, Han-Kil ; Kim, Su-Jin ; Lee, Hwan-Kyu ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 602~608
DOI : 10.6109/jkiice.2014.18.3.602
Smartphones have become commonplace to use smart, BYOD (Bring Your Own Device) spread the trend of domestic WLAN use is intensifying as a result, the security threat will be greatly increased. Even though WLAN vendors such as Cisco Systems Inc,. Aruba networks released WIPS, MDM, DLP etc, however, these solutions can not be easily introduced for small business due to high cost or administrative reasons. In this paper, without the introduction of expensive H/W equipment, in WLAN environments, packet analysis, AP, Station management, security vulnerabilities can be analyzed by the proposed intrusion detection system.
Analysis of Linear Span of Non-linear Binary Sequences with Decimation d=2
Yim, Ji-Mi ; Cho, Sung-Jin ; Kim, Han-Doo ; Kim, Seok-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 609~616
DOI : 10.6109/jkiice.2014.18.3.609
Large linear span makes difficult to predict, so this study is important to the security and code system. It has been studied about the non-linear binary sequences having low correlation values and large linear span. In this paper we analyze the linear span of
) where n=2m and
A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment
Ko, Bong-Koo ; Park, Jong-Seon ; Chung, Seung-Jong ; Cho, Gi-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 617~624
DOI : 10.6109/jkiice.2014.18.3.617
A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.
Document Clustering Technique by K-means Algorithm and PCA
Kim, Woosaeng ; Kim, Sooyoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 625~630
DOI : 10.6109/jkiice.2014.18.3.625
The amount of information is increasing rapidly with the development of the internet and the computer. Since these enormous information is managed by the document forms, it is necessary to search and process them efficiently. The document clustering technique which clusters the related documents through the similarity between the documents help to classify, search, and process the large amount of documents automatically. This paper proposes a method to find the initial seed points through principal component analysis when the documents represented by vectors in the feature vector space are clustered by K-means algorithm in order to increase clustering performance. The experiment shows that our method has a better performance than the traditional K-means algorithm.
ElggSpace: Extension of Elgg SNS for Supporting Collaborative Workspace
Cha, Won-Jun ; Park, Jongmoon ; Lee, Myung-Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 631~637
DOI : 10.6109/jkiice.2014.18.3.631
Recently, SNS is widely used for various purposes such as fast decision making or effective business process in educational institutions or enterprise as well as general services for social networking. Unfortunately, all of existing general SNS platforms do not provide user groups with workspaces for sharing information in a hierarchical way, nor support the functionality of workspace backup for migrations. In this paper, we present a collaborative workspace environment named ElggSpace which extends the Elgg SNS platform with the C3ware collaborative middleware. With the help of C3ware, ElggSpace systematically supports collaborative workspaces that enable user groups to share massive resource in cloud storages. In addition, ElggSpace allows high-level access controls for resources management and the functionality of resource backup, supporting effective collaboration.
Physical correlation between annealing process and crystal structure and magneto-resistance of Bismuth thin films
Jang, Seok Woo ; Seo, Young-Ho ; An, Ho-Myoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 638~642
DOI : 10.6109/jkiice.2014.18.3.638
In this study, we investigate on the crystal microstructure and magneto-resistance (MR) change of Bismuth(Bi) thin films for annealing process, in order to apply Bi thin films to the spin electronic devices. As-prepared Bi thin films show the randomly oriented find grains whose size was measured to about 100 nm and the very low MR (4.7 % at room temperature) while careful annealing results in not only grain growth up to
but also drastic MR improvement (404 % at room temperature). The drastic change in the MR after applying the annealing process is attributed to the grain growth decreasing grain boundary scattering of electron. Therefore, in this study, we confirm the annealing effect for the grain boundary formation and MR improvement of Bi thin films, and demonstrate the feasibility of spin electronic devices.
Differential CORDIC-based High-speed Phase Calculator for 3D Depth Image Extraction from TOF Sensor
Koo, Jung-Youn ; Shin, Kyung-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 643~650
DOI : 10.6109/jkiice.2014.18.3.643
A hardware implementation of phase calculator for extracting 3D depth image from TOF(Time-Of-Flight) sensor is described. The designed phase calculator adopts redundant binary number systems and a pipelined architecture to improve throughput and speed. It performs arctangent operation using vectoring mode of DCORDIC(Differential COordinate Rotation DIgital Computer) algorithm. Fixed-point MATLAB simulations are carried out to determine the optimal bit-widths and number of iteration. The phase calculator has ben verified by FPGA-in-the-loop verification using MATLAB/Simulink. A test chip has been fabricated using a TSMC
CMOS process, and test results show that the chip functions correctly. It has 82,000 gates and the estimated throughput is 400 MS/s at 400Mhz@1.8V.
Analysis of Subthreshold Swing for Channel Doping of Asymmetric Double Gate MOSFET
Jung, Hakkee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 651~656
DOI : 10.6109/jkiice.2014.18.3.651
This paper analyzed the change of subthreshold swing for channel doping of asymmetric double gate(DG) MOSFET. The subthreshold swing is the factor to describe the decreasing rate of off current in the subthreshold region, and plays a very important role in application of digital circuits. Poisson's equation was used to analyze the subthreshold swing for asymmetric DGMOSFET. Asymmetric DGMOSFET could be fabricated with the different top and bottom gate oxide thickness and bias voltage unlike symmetric DGMOSFET. It is investigated in this paper how the doping in channel, gate oxide thickness and gate bias voltages for asymmetric DGMOSFET influenced on subthreshold swing. Gaussian function had been used as doping distribution in solving the Poisson's equation, and the change of subthreshold swing was observed for projected range and standard projected deviation used as parameters of Gaussian distribution. Resultly, the subthreshold swing was greatly changed for doping concentration and profiles, and gate oxide thickness and bias voltage had a big impact on subthreshold swing.
Subthreshold Swing for Top and Bottom Gate Voltage of Asymmetric Double Gate MOSFET
Jung, Hakkee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 657~662
DOI : 10.6109/jkiice.2014.18.3.657
This paper has analyzed the subthreshold swings for top and bottom gate voltages of asymmetric double gate(DG) MOSFET. The asymmetric DGMOSFET is four terminal device to be able to separately bias for top and bottom gates. The subthreshold swing, therefore, has to be analyze not only for top gate voltage, but also for bottom gate voltage. In the pursuit of this purpose, Poisson equation has been solved to obtain the analytical solution of potential distribution with Gaussian function, and the subthreshold swing model has been presented. As a result to observe the subthreshold swings for the change of top and bottom gate voltage using this subthreshold swing model, we know the subthreshold swings are greatly changed for gate voltages. Especially we know the conduction path has been changed for top and bottom gate voltage and this is expected to greatly influence on subthreshold swings.
Electrical Characteristics of RRAM with HfO
Annealing Temperatures and Thickness
Choi, Jin-Hyung ; Yu, Chong Gun ; Park, Jong-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 663~669
DOI : 10.6109/jkiice.2014.18.3.663
The electrical characteristics of RRAM with different annealing temperature and thickness have been measured and discussed. The devices with Pt/Ti top electrode of 150nm, Pt bottom electrode of 150nm,
oxide thickness of 45nm and 70nm have been fabricated. The fabricated device were classified by 3 different kinds according to the annealing temperature, such as non-annealed, annealed at
and annealed at
. The set and reset voltages and the variation of resistance with temperatures have been measured as electrical properties. From the measurement, it was found that the set voltages were decreased and the reset voltage were increased slightly, and thus the sensing window was decreased with increasing of measurement temperatures. It was remarkable that the device annealed at
showed the best performances. Although the device with thickness of 45nm showed better performances in the point of the sensing window, the resistance of 45nm devices was large relatively in the low resistive state. It can be expected to enhance the device performances with ultra thin RRAM if the defect generation could be reduced at the
Suspectible Object Detection Method for Radiographic Images
Kim, Gi-Tae ; Kang, Hyun-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 670~678
DOI : 10.6109/jkiice.2014.18.3.670
This paper presents a method to extract objects in radiographic images where all the allowable combinations of segmented regions are compared to a target object using Fourier descriptor. In the object extraction for usual images, a main problem is occlusion. In radiographic images, there is an advantage that the shape of an object is not occluded by other objects. It is because radiographic images represent the amount of radiation penetrated through objects. Considering the property of no occlusion in radiographic images, the shape based descriptors can be very effective to find objects. After all, the proposed object extraction method consists of three steps of segmenting regions, finding all the combinations of the segmented regions, and matching the combinations to the shape of the target object. In finding the combinations, we reduce a lot of computations to remove unnecessary combinations before matching. In matching, we employ Fourier descriptor so that the proposed method is rotation and shift invariant. Additionally, shape normalization is adopted to be scale invariant. By experiments, we verify that the proposed method works well in extracting objects.
The Study about the Differential compression based on the ROI(Region Of Interest)
Yun, Chi-Hwan ; Ko, Sun-Woo ; Lee, Geun-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 679~686
DOI : 10.6109/jkiice.2014.18.3.679
Recently, users can get countless images and videos by network. So, the compression technology of image and video is researched more and more. However, the situation which is the interested range of the image is occurred. For instance, since the region of face is more important than background, the image compression technology bases on the region of interest (ROI) is necessary, in the ATM environment. In this research, given the human visual system, which are not sensitive to illumination variations at very dark and light regions of image, we calculate the standard deviation of block and use this value to define the ROI. In encoding process, the relatively high quality can be obtained at the ROI and the relatively low quality can be obtained at the non ROI. In proposed scheme, the feature which is the encoding process according to subjectively image quality can be demonstrated. Finally, this proposed scheme is applied to JPEG standard. The experimental results demonstrate that proposed scheme can achieve better image quality at the high compression ratio.
Color-Depth Combined Semantic Image Segmentation Method
Kim, Man-Joung ; Kang, Hyun-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 687~696
DOI : 10.6109/jkiice.2014.18.3.687
This paper presents a semantic object extraction method using user's stroke input, color, and depth information. It is supposed that a semantically meaningful object is surrounded with a few strokes from a user, and has similar depths all over the object. In the proposed method, deciding the region of interest (ROI) is based on the stroke input, and the semantically meaningful object is extracted by using color and depth information. Specifically, the proposed method consists of two steps. The first step is over-segmentation inside the ROI using color and depth information. The second step is semantically meaningful object extraction where over-segmented regions are classified into the object region and the background region according to the depth of each region. In the over-segmentation step, we propose a new marker extraction method where there are two propositions, i.e. an adaptive thresholding scheme to maximize the number of the segmented regions and an adaptive weighting scheme for color and depth components in computation of the morphological gradients that is required in the marker extraction. In the semantically meaningful object extraction, we classify over-segmented regions into the object region and the background region in order of the boundary regions to the inner regions, the average depth of each region being compared to the average depth of all regions classified into the object region. In experimental results, we demonstrate that the proposed method yields reasonable object extraction results.
Object Width Measurement System Using Light Sectioning Method
Lee, Byeong-Ju ; Kang, Hyun-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 697~705
DOI : 10.6109/jkiice.2014.18.3.697
This paper presents a vision based object width measurement method and its application where the light sectioning method is employed. The target object for measurement is a tread, which is the most outside component of an automobile tire. The entire system applying the measurement method consists of two processes, i.e. a calibration process and a detection process. The calibration process is to identify the relationships between a camera plane and a laser plane, and to estimate a camera lens distortion parameters. As the process requires a test pattern, namely a jig, which is elaborately manufactured. In the detection process, first of all, the region that a laser light illuminates is extracted by applying an adaptive thresholding technique where the distribution of the pixel brightness is considered to decide the optimal threshold. Then, a thinning algorithm is applied to the region so that the ends and the shoulders of a tread are detected. Finally, the tread width and the shoulder width are computed using the homography and the distortion coefficients obtained by the calibration process.
Determining of Weighting Factor for Two-Point Interpolation Filters
Ha, Mi-Ryeong ; Yoo, Hoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 706~712
DOI : 10.6109/jkiice.2014.18.3.706
This paper describes a determining method of weighting factors for two-point interpolation filters. The interpolation filters is implemented by applying modifying functions to the linear interpolation. Here, there is a problem of determining weights when modifying functions being engaged. The previous method determined the weights by imposing c1-continuity on the interpolation kernels. However, this approach is unable to use the property of individual modifying functions. In this paper, on the basis of spectral analyses of the modifying functions and image signals, we provide a determination method by experimental results. Thus, many experiments are carried out to do so. The results indicate that different weights are required for different modifying functions and also the proposed method outperforms than the previous method.
A Study on the Design of Relay Terminal Analysis Tool and Real-time Monitoring System for Driving Control Information of Snow-Removal Vehicles
Lee, Yang Sun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 713~718
DOI : 10.6109/jkiice.2014.18.3.713
This paper proposed a real-time monitoring system that can realize effective operation of snowplows each of the local autonomous entities secures to cope with disasters in Korea like a wintertime heavy snowfall and also can promptly cope with the spot facing a heavy snowfall disaster by doing real-time monitoring on the information of the snow-removal site and the mobility of the vehicles. Also, the study has designed a relay terminal analysis tool so that the proposed system can analyze all kinds of controlling information and diagnose the relay terminal effectively. The proposed system can realize effective and emergent coping with the situations of a heavy snowfall disaster through real-time routing trace as well as effective work progress within a short time by doing real-time monitoring on the information about the status of snow-removal work and vehicle controlling for snow-removal work as well as the location information of snow-removal vehicles in the situations of a heavy snowfall.
A Study of Applying TRIZ in Software Development
Kim, Eun-Gyung ; Koo, Bon-Chul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 719~726
DOI : 10.6109/jkiice.2014.18.3.719
TRIZ, the theory of inventive problem solving, is widely used in traditional engineering fields such as mechanical, electrical, and electronic engineering and generated good results. Yet there are few examples in software field. But software field requires creative problem solving capabilities more than any other fields and we expect that we can get remarkable results by applying TRIZ in this field. In this paper, we try to break the psychological inertia that TRIZ is difficult to use in software area through development of new software, the Smart Clicker, by applying TRIZ. And we present an approach how to apply TRIZ in software field.
Image Restoration for Edge Preserving in Mixed Noise Environment
Long, Xu ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 727~734
DOI : 10.6109/jkiice.2014.18.3.727
Digital processing technologies are being studied in various areas of image compression, recognition and recovery. However, image deterioration still occurs due to the noises in the process of image acquisition, storage and transmission. Generally in the typical noises which are included in the images, there are Gaussian noise and the mixed noise where the Gaussian noise and impulse noise are overlapped and in order to remove these noises, various researches are being executed. In order to preserve the edge and effectively remove mixed noises, image recovery filter algorithm was suggested in this study which sets and processes the adaptive weight using the median values and average values after noise judgment. Additionally, existing methods were compared through simulations and PSNR(peak signal to noise ratio) was used as a judgment standard.
A Study on Edge Detection Algorithm using Modified Mask of Weighting
Lee, Chang-Young ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 735~741
DOI : 10.6109/jkiice.2014.18.3.735
Edge in images appears when a great difference shows up in light and shade between pixels and includes data of the subject's size, location direction and etc. The edge is generally detected by the methods such as Sobel, Roberts, Laplacian, LoG(Laplacian of Gaussian) and etc. However, in AWGN(additive white Gaussian noise) added images, quality of the edge becomes slightly uncertain. Therefore, this paper proposed edge detection algorithm using modified mask of weighting to improve the quality of the existing methods. And in order to verify the performance efficiency of the proposed method, processed image and PFOM(Pratt's figure of merit) has been used as valuation standard for a comparison with the existing methods.
A Development of the Evaluation Metrics and Analysis of the Object-Oriented Visual Programming Education Using Alice Programming
Jung, Deok-Gil ; Jung, Min-Po ; Cho, Hyuk-Gyu ; Lho, Young-Uhg ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 742~748
DOI : 10.6109/jkiice.2014.18.3.742
The research of the object-oriented visual programming education is related to investigate the instructional method for computer programming, the process for program development for students, and the suitability analysis and design methodology for program development. In order to develop the educational methodology for the students who have the difficulties to study the computer programming and to enhance the abilities for the development of object-oriented programs, in this paper, we suggest the evaluation metrics to apply and assess for the object-oriented programming education. Also, we introduce the visual programming education methodology and curriculum using Alice programming. The evaluation metrics for the visual programming education suggested in this paper, is accepted when the visual programming languages/tools are used in the programming education to assess and analyze the suitabilities for the programming education for students, so to utilize the analyses for abilities of understanding, abstraction, and program implementation by level.
A Study on Digital Film Acting - Focus on Pratical Use of Stanislavsky's Circle of Attention
Yoo, Dong-Hyuk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 749~753
DOI : 10.6109/jkiice.2014.18.3.749
The purpose of this study analyzes the basic elements of film acting based on Stanislavsky Circles of Attention. This research also demonstrates the basic elements on how to become a good film actor. I attempt to interpret Stanislavsky Circles of Attention, in order to adapt the size of camera shots and the location of microphones. This Circles of Attention is an effective method utilized for actors to help them understand and be absorbed in the work of art both in film and stage. It is useful for building a character in realism drama as well as in film. I believe Stanislavsky Circles of Attention is certainly the most advanced acting style in film because it proposes the importance of physical action for actors.
Development of Reliable Push Notification Middleware and Module based on Smart Phone
Jung, Joon-Seok ; Kim, Tae Yong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 754~760
DOI : 10.6109/jkiice.2014.18.3.754
Push Notification Service technology is to provide platform competition rather than unit-based technology. In Korea, only the type of a service using the technology provided by this main platform has been studied and the study of the based technology has not been developed consistently. In this paper, new types of Push Notification Service capable of domestic technology acquisition was proposed and designed.
The Design of Military Security Audit based on the M-ISMS Model
Kim, Dae Gyu ; Cho, Hee Joon ; Kim, Chang Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 18, issue 3, 2014, Pages 761~769
DOI : 10.6109/jkiice.2014.18.3.761
We propose an improved M-ISMS(Military-ISMS) model which is based on common ISMS model for regarding military's unique characteristics. Our model focuses on 'Internal Security Audit' and 'Management of external activity' as military circumstances. So, we added the six control new items as internal security audits. Because the confidentiality is more important than availability in military service as compared with private sectors. In addition, we propose some control suggestions for establishing security management standards and keeping level maintenance when it will becomes to lose a value as confidential. The M-ISMS model in this paper has effectiveness which prevents security incidents in advance rapidly throughout a variety of common ISMS's advantages and security incidents of private sectors in consideration of military characteristics.