Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 19, Issue 12 - Dec 2015
Volume 19, Issue 11 - Nov 2015
Volume 19, Issue 10 - Oct 2015
Volume 19, Issue 8 - Aug 2015
Volume 19, Issue 9 - Aug 2015
Volume 19, Issue 7 - Jul 2015
Volume 19, Issue 6 - Jun 2015
Volume 19, Issue 5 - May 2015
Volume 19, Issue 4 - Apr 2015
Volume 19, Issue 3 - Mar 2015
Volume 19, Issue 2 - Feb 2015
Volume 19, Issue 1 - Jan 2015
Selecting the target year
Korea MVNO Policy and Adequacy Study
Shin, Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2765~2772
DOI : 10.6109/jkiice.2015.19.12.2765
In Korea MVNO was introduced in 2011 when twenty seven years had passed since Korea Mobile Telecom(now SK Telecom) started mobile phone service. MVNO can make competition more effective to lower communication costs through the alternatives. In the early 2000s, the need for the introduction of the MVNO has been raised already by scholars in Korea. But it wasn't until the late 2000s when rate cuts appeared to be a major policy issue, and Korean government introduced MVNO. In April 2015, MVNO's market share reached 8.8%, but Korea does not have a firm system yet. This rapid growth of MVNO market in Korea was made possible by consumers' demand for cheaper services and late introduction of MVNO. And telecom companies(MNO) abuse their supreme power against small and medium firm MVNOs and reserved market share using their subsidiary companies. Thus proper regulation is necessary. However, the government authorities should have recognized global MVNO flow quickly and have to make a sufficient effort to establish proper competition condition of the mobile telecom market.
A Compact CPW-fed Antenna consisted of Three Folded Patches for Mobile Handsets
Choi, In-Tae ; Shin, Ho-Sub ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2773~2778
DOI : 10.6109/jkiice.2015.19.12.2773
In this paper, the compact antenna with three folded patches for use in a number of bands of LTE, WCDMA, US-PCS, and WLAN at the same time is proposed. As the changes in widths of the 3 patches to widen the insufficient bandwidth are given, it is optimized for
<-6dB(VSWR<3). The CPW with a number of advantages is used in the proposed antenna. The proposed antenna is designed and fabricated with FR4 substrate to the size of
. Fabricated antenna has within
<-6dB under operating bands. And measured characteristics of radiation patterns and gains are shown under operating bands.
A Short-Term Vehicle Speed Prediction using Bayesian Network Based Selective Data Learning
Park, Seong-ho ; Yu, Young-jung ; Moon, Sang-ho ; Kim, Young-ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2779~2784
DOI : 10.6109/jkiice.2015.19.12.2779
The prediction of the accurate traffic information can provide an optimal route from the place of departure to a destination, therefore, this makes it possible to obtain a saving of time and money. To predict traffic information, we use a Bayesian network method based on probability model in this paper. Existing researches predicting the traffic information based on a Bayesian network generally used to study the data for all time. In this paper, however, only data corresponding to same time and day of the week to predict selectively will be used for learning. In fact, the experiment was carried out for 14 links zone in Seoul, also, the accuracy of the prediction results of the two different methods should be tested with MAPE (Mean Absolute Percentage Error) which is commonly used. In view of MAPE, experimental results show that the proposed method may calculate traffic prediction value with a higher accuracy than the method used to learn the data for all time zones.
Needle Detection by using Morphological Operation and Line Segment Approximation
Jang, Kyung-shik ; Han, Soowhan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2785~2791
DOI : 10.6109/jkiice.2015.19.12.2785
In this paper, neddle detection algorithm for the removal of needle stuck into skin in oriental clinic is presented. First, in the proposed method, potential candidate areas of each needle are selected by using the morphological open operation in a gray image, and the false candidates are removed by considering their area size. Next, edge points are extracted using canny edge detector in selected candidate areas, line segments are approximated using the edge points. Based on the direction of line segment and the distance between two line segments, two main line segments of the needle are extracted. The final verification of needle is accomplished by using the morphological analysis of these two line segments. In the experiments, the detection rate of proposed method reaches to 97.5% for the 16 images containing 119 needles.
Performance Improvement of Speaker Recognition Using Enhanced Feature Extraction in Glottal Flow Signals and Multiple Feature Parameter Combination
Kang, Jihoon ; Kim, Youngil ; Jeong, Sangbae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2792~2799
DOI : 10.6109/jkiice.2015.19.12.2792
In this paper, we utilize source mel-frequency cepstral coefficients (SMFCCs), skewness, and kurtosis extracted in glottal flow signals to improve speaker recognition performance. Generally, because the high band magnitude response of glottal flow signals is somewhat flat, the SMFCCs are extracted using the response below the predefined cutoff frequency. The extracted SMFCC, skewness, and kurtosis are concatenated with conventional feature parameters. Then, dimensional reduction by the principal component analysis (PCA) and the linear discriminat analysis (LDA) is followed to compare performances with conventional systems under equivalent conditions. The proposed recognition system outperformed the conventional system for large scale speaker recognition experiments. Especially, the performance improvement was more noticeable for small Gaussan mixtures.
Scheduling Scheme for Underlay-based D2D Direct Communications in Cellular Networks
Ban, Tae-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2800~2804
DOI : 10.6109/jkiice.2015.19.12.2800
Recently, device-to-device (D2D) direct communication is attracting much interest and many researches have been conducted. In this paper, we investigated an algorithm to support the D2D direct communication in cellular mobile communication networks. We investigated the optimal D2D scheduling algorithm which can achieve the maximal sum-rate in cellular uplink frequency. We also proposed a simple scheduling algorithm which can considerably reduce the computational complexity, compared to the optimal scheme. Finally, we analyzed the performance of the proposed scheme based on computer simulations.
Reference Symbol Arrangement in LTE OFDM Systems
Choi, Seung-Kuk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2805~2812
DOI : 10.6109/jkiice.2015.19.12.2805
For the purpose of estimation of time variant frequency selective transmission channels, reference symbols are usually employed. The bit error performance of LTE OFDM systems is analyzed in the case of LTE standard reference symbol arrangement. Results show that LTE OFDM system with this LTE reference symbol arrangement is robust against Doppler time variant fading. However, the performance of that system is degraded due to channel estimation error in frequency domain. An equidistant arrangement with a diamond shape structure of reference symbols, however having 4 subcarriers distance in frequency domain, is suggested for the optimal channel estimation.
On the Practical Physical-Layer Network Coding with Partially Overlapped Packets
Lim, Hyeonwoo ; Jung, Bang Chul ; Ban, Tae-Won ; Sung, Kil-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2813~2819
DOI : 10.6109/jkiice.2015.19.12.2813
In this paper, we investigate the physical layer network coding (PNC) technique in a two-way relay channel (TWRC) where two source nodes send and receive data with each other via a relay node. In particular, we consider the communication scenario where packet length from the two sources is different from each other. We analyze the bit error rate (BER) of the received packet at the relay node according to degree of overlapping between two packets. The BER of the short packet remains unchanged regardless of the degree of overlapping since the entire packet is overlapped with the longer packet, while the BER of the longer packet becomes improved as the degree of overlapping decreases. Thus, we need a novel transmission scheme to enhance BER performance of the PNC technique in TWRC environments since the overall BER performance of the PNC technique at the relay node depends on the worse BER between two ovelapping packets' BERs.
Design and Implementation of an HSMS Communication System using Low-Cost MCUs
Kim, Su-Hee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2820~2827
DOI : 10.6109/jkiice.2015.19.12.2820
HSMS communication system using low-cost micro controller units(MCUs) is an essential technique for online semiconductor equipment system developments. It is intended as an alternative to SEMI E4 (SECS-I) for applications where higher speed communication is needed and the facilitated hardware setup is convenient. In this paper, an HSMS communication system using low-cost MCUS is designed and implemented. Using a MCU with a low price but high-performance as a main board, a module which processes HSMS communication is designed, and a circuit is designed to process BCR independently with a microminiature MCU. To convert tag data which is recognized from BCR into data based on HSMS communication protocol, SECS-II message is designed. Lastly, an HSMS communication system is implemented based on these designs. A low-cost HSMS communication module developed in this study can be applied in realtime monitoring and controlling system for semiconductor processes.
Availability Analysis of Redundancy Models for Network System with Non-Stop Forwarding
Shim, Jaechan ; Ryu, Hongrim ; Ryu, Hoyong ; Park, Jaehyung ; Lee, Yutae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2828~2835
DOI : 10.6109/jkiice.2015.19.12.2828
In this paper, we analyse the effect of redundancy types and non-stop forwarding scheme on network service availability. We use stochastic reward net models as enabling modeling approach for the analytical evaluation. We first design stochastic reward nets for redundancy models with or without non-stop forwarding and then evaluate their availability using Stochastic Petri Net Package.
Indoor Location-based Emergency Call Service System for Ships using VLC Technology
Hong, Seung-Beom ; Lee, Kyou-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2836~2843
DOI : 10.6109/jkiice.2015.19.12.2836
Due to metallicity of materials, a vessel has a limitation to adopt RF-based wireless communication technologies for the inner communication means. Visible Light Communication(VLC) can be a sound alternative to dissolve such a limitation. Using a visual light as a transmission medium, VLC is free from radio interferences and restriction of radio usages which are typically related to RF-based wireless communications. In addition, VLC can not only require the facility cost relatively low because of being possibly converged with existing LED illumination, but also be harmless to the human body. This paper proposes an indoor location-based emergency call service system solution for ships using the VLC technology that supports 256Kbps data rate and 5m transmission distance. This paper presents real implementation and testing results of the solution which verifies the propriety of the proposal.
Correction of Missing Feature Points for 3D Modeling from 2D object images
Koh, Sung-shik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2844~2851
DOI : 10.6109/jkiice.2015.19.12.2844
How to recover from the multiple 2D images into 3D object has been widely studied in the field of computer vision. In order to improve the accuracy of the recovered 3D shape, it is more important that noise must be minimized and the number of image frames must be guaranteed. However, potential noise is implied when tracking feature points. And the number of image frames which is consisted of an observation matrix usually decrease because of tracking failure, occlusions, or low image resolution, and so on. Therefore, it is obviously essential that the number of image frames must be secured by recovering the missing feature points under noise. Thus, we propose the analytic approach which can control directly the error distance and orientation of missing feature point by the geometrical properties under noise distribution. The superiority of proposed method is demonstrated through experimental results for synthetic and real object.
Extraction of Physical Contact in Elevator
Shin, Seong-Yoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2852~2857
DOI : 10.6109/jkiice.2015.19.12.2852
Assault and violence in the elevator is a crime that occurs most frequently. In particular, these days, is a phenomenon that occurs frequently, knowing that there is a CCTV camera. In this paper, we extract the phenomena of contact between people in the elevator. Many people ride the elevator does not cause these symptoms. However, this crime occurs when fewer people ride the elevator. Extraction method of contact is seeking the skeleton of binary image and extracts the contact status of each skeleton. Therefore, immediately detecting the violence and assaults that occur in the elevator and to notify the security office of the building.
The Propagation Dynamics of Multiple Internet Worms
Shin, Weon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2858~2864
DOI : 10.6109/jkiice.2015.19.12.2858
Internet worms have been the major Internet threats may disclose important information and can bring about faults of computer systems, which spread with the fastest speed among malicious codes. Simultaneously spreading multiple worms and its variants are revealing the limitation of conventional responses based on single worms. In order to defend them effectively, it is necessary to study how multiple worms propagate and what factors affect worm spreading. In this paper, we improve the existed single worm spreading models and try to describe the correct spreads of multiple worms. Thus we analyze the spreading effects of multiple worms and its variants by various experiments.
An enhanced method using NP-complete problem in Public Key Cryptography System
Baek, Jaejong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2865~2870
DOI : 10.6109/jkiice.2015.19.12.2865
Recently, due to the hardware computing enhancement such as quantum computers, the amount of information that can be processed in a short period of time is growing exponentially. The cryptography system proposed by Koblitz and Fellows has a problem that it can not be guaranteed that the problem finding perfect dominating set is NP-complete in specific 3-regular graphs because the number of invariant polynomial can not be generated enough. In this paper, we propose an enhanced method to improve the vulnerability in 3-regular graph by generating plenty of invariant polynomials.
A Method to utilize Inner and Outer SNS Method for Analyzing Preferences
Park, Sung-Hoon ; Kim, Jindeog ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2871~2877
DOI : 10.6109/jkiice.2015.19.12.2871
Shopping patterns are changing with the emergence of SNS. Recently, it is also interested in providing the information based on the users' needs. Generally, the provided information is obtained from the history of users' simple browsing. Best selling hot item list is also provided in order to reflect the preferences of public users. However, the provided information is irrelevant to an individual preference. In this paper, we propose a method to utilize inner and outer SNS for analyzing public preferences about goods which are interested by individual users. The inner analyzing module collects and analyzes the preferences of community members about two goods designated by individual users. The outer analyzing module supports to analyze public preferences by using the tweeter SNS. The results of implementation show that it is possible to recommend goods based on the individual users' preferences unlike the existing shopping mall.
Improved Tweet Bot Detection Using Geo-Location and Device Information
Lee, Al-Chan ; Seo, Go-Eun ; Shin, Won-Yong ; Kim, Donggeon ; Cho, Jaehee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2878~2884
DOI : 10.6109/jkiice.2015.19.12.2878
Twitter, one of online social network services, is one of the most popular micro-blogs, which generates a large number of automated programs, known as tweet bots because of the open structure of Twitter. While these tweet bots are categorized to legitimate bots and malicious bots, it is important to detect tweet bots since malicious bots spread spam and malicious contents to human users. In the conventional work, temporal information was utilized for the classficiation of human and bot. In this paper, by utilizing geo-tagged tweets that provide high-precision location information of users, we first identify both Twitter users' exact location. Then, we propose a new tweet bot detection algorithm by using both an entropy based on geographic variable of each user and device information of each user. As a main result, the proposed algorithm shows superior bot detection and false alarm probabilities over the conventional result which only uses temporal information.
Improved Tweet Bot Detection Using Spatio-Temporal Information
Kim, Hyo-Sang ; Shin, Won-Yong ; Kim, Donggeon ; Cho, Jaehee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2885~2891
DOI : 10.6109/jkiice.2015.19.12.2885
Twitter, one of online social network services, is one of the most popular micro-blogs, which generates a large number of automated programs, known as tweet bots because of the open structure of Twitter. While these tweet bots are categorized to legitimate bots and malicious bots, it is important to detect tweet bots since malicious bots spread spam and malicious contents to human users. In the conventional work, temporal information was utilized for the classficiation of human and bot. In this paper, by utilizing geo-tagged tweets that provide high-precision location information of users, we first identify both Twitter users' exact location and the corresponding timestamp, and then propose an improved two-stage tweet bot detection algorithm by computing an entropy based on spatio-temporal information. As a main result, the proposed algorithm shows superior bot detection and false alarm probabilities over the conventional result which only uses temporal information.
Design of Double-Independent-Gate Ambipolar Silicon-Nanowire Field Effect Transistor
Hong, Seong-Hyeon ; Yu, YunSeop ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2892~2898
DOI : 10.6109/jkiice.2015.19.12.2892
We propose a new Double-Independent-Gate Ambipolar Silicon-Nanowire Field Effect Transistor(DIG Ambi-SiNWFET). The proposed transistor has two types of gate such as polarity gate and control gate. The polarity gate determines the operation that the gate bias controls NMOSFET or PMOSFET. The voltage of control gate controls the current characteristic of the transistor. We investigated systematically work functions of the two gates and source/drain to operate ambipolar current-voltage characteristics using 2D device simulator. When the work functions of polarity gate, control gate and source/drain are 4.75eV, 4.5eV, and 4.8eV, respectively, it showed the obvious ambipolar characteristics.
Interface trap density distribution in 3D sequential Integrated-Circuit and Its effect
Ahn, TaeJun ; Lee, Si Hyun ; Yu, YunSeop ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2899~2904
DOI : 10.6109/jkiice.2015.19.12.2899
This paper introduces about the effect on
characteristic of transistor that interface trap charge is created by damage due to heat in a 3D sequential inverter. A interface trap charge distribution in oxide layer in a 3D sequential inverter is extracted using two-dimensional device simulator. The variation of threshold voltage of top transistor according to the gate voltage variation of bottom transistor is also described in terms of Inter Layer Dielectric (ILD) length of 3D sequential inverter, considering the extracted interface trap charge distribution. The extracted interface trap density distribution shows that the bottom
layer and both the bottom and top
layer were relatively more affected by heat than the top
layer with latest process. The threshold voltage variations of the shorter length of ILD in 3D sequential inverter under 50nm is higher than those over 50nm. The
variation considering the interface trap charge distribution changes less than that excluding it.
Algorithm for Detecting Direction of Single IF Scheme CW Radar Sensor
Han, Byung-Hun ; Shin, Hyun-Jun ; Oh, Chang-Heon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2905~2910
DOI : 10.6109/jkiice.2015.19.12.2905
CW Radar Sensors can be categorized into Single and Dual by its IF output type. Dual IF type is used for detecting the direction of moving objects. However, Dual IF type has more complicated circuitry than Single IF type and higher cost due to more parts required. In this paper, we propose an algorithm for Single IF type CW radar sensors to detect the direction of moving objects. It performs FFT on signals created at IF output when an object moves and determines approach, stop and recede according to amplitude variations. In order to verify the algorithm, a function generator is used to create a virtual signal and confirmed that it accurately detects the directions according to amplitude variations.
Implementation of a Monitoring System Using a CW Doppler Radar
Shin, Hyun-Jun ; Han, Byung-Hun ; Choi, Doo-Hyun ; Oh, Chang-Heon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2911~2916
DOI : 10.6109/jkiice.2015.19.12.2911
The CCTV is limited by weather conditions. To overcome this limitation, we develop a monitoring program that can sense the approach or recede of two or more objects within a surveillance system that uses a continuous-wave (CW) Doppler radar, and we proposed an algorithm to efficiently detect the approach or recede information of the object. The proposed algorithm separates the signal received by the CW Doppler radar into the real and imaginary parts using Fast Fourier Transform (FFT), and sums the amplitudes for each frequency to determine whether the objects are approaching or receding, using their locations. The algorithm is verified by simulations and experiments, which confirms that it successfully detects the approach or recede of two objects.
Development of Reefer Container Real-time Management System
Choi, Sung-Pill ; Jung, Jun-Woo ; Moon, Young-Sik ; Kim, Tae-Hoon ; Lee, Byung-Ha ; Kim, Jae-Joong ; Choi, Hyung-Lim ; Lee, Eun-Kyu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2917~2923
DOI : 10.6109/jkiice.2015.19.12.2917
In spite of a recent trend of container ships becoming larger in size, the current circumstance is that managing reefer containers marine transportation is being mostly dependent upon manpower. Particularly, in the case of bad weather or nighttime, reefer containers are not being monitored due to lack of safety device. For the purpose of reducing such risk, IMO is recommending a system using PLC but the system is not being used. In addition, they are still relying on manpower for control and reliability of freight in transit is decreasing due to lack of information during marine transportation for every subject related to freight as well as shipper. Accordingly, the purpose of this paper is to propose a real-time reefer container management system to effectively control all reefer containers widely being used across the world.
An α-cut Automatic Set based on Fuzzy Binarization Using Fuzzy Logic
Lee, Ho Chang ; Kim, Kwang Baek ; Park, Hyun Jun ; Cha, Eui-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2924~2932
DOI : 10.6109/jkiice.2015.19.12.2924
Image binarization is a process to divide the image into objects and backgrounds, widely applied to the fields of image analysis and its recognition. In the existing method of binarization, there is some uncertainty when there is insufficient brightness gap between objects and backgrounds in setting threshold. The method of fuzzy binarization has improved the features of objects efficiently. However, since this method sets
-cut value statically, there remain some problems that important features of objects can be lost during binarization. Therefore, in this paper, we propose a binarization method which does not set
-cut value statically. The proposed method uses fuzzy membership functions calculated by thresholds of mean, iterative, and Otsu binarization. Experiment results show the proposed method binaries various images with less loss than the existing methods.
A New Image Encryption Method using Quad-tree based Fresnelet Transform
Seo, Young-ho ; Lee, Yoon-hyuk ; Kim, Dong-wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2933~2942
DOI : 10.6109/jkiice.2015.19.12.2933
This paper proposes a new method which traces significant element of 2-dimensional natural images and encrypts them by using Fresnelet transform (FRNLT). After analyzing property of the subbands obtained by the FRNLT, we estimated the information for ciphering 2D images. Considering FRNLT levels, energy of subbands, and visual effect, we estimated the optimized point for encryption. By selecting various levels and encrypting region, we can encrypt 2D image with various robustness. Encryption effectiveness was showed by analyzing numerical result, executing time for encryption, area of encrypted region, and visual observation. Therefore encryption for various application can be applied by using the suggested parameters without additional analysis. Identifying the experimental result, in the case of
, an image was not recognized through encrypting only 0.42% among the entire data.
3D Reconstruction Using a Single Camera
Kwon, Oh-Young ; Seo, Kyoung-Taek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2943~2948
DOI : 10.6109/jkiice.2015.19.12.2943
Run 3D reconstruction using a single camera, based on the information, we are advancing research on driving assistance apparatus or can be informed how to pass the obstacle existing ahead the driver. As a result depth information falls but it is possible to provide information that can pass through an obstacle on the straight. For 3D reconstruction by measuring the internal parameters, it calculates the Fundamental matrix and matching to find the feature points obtained by executing the triangulation on the basis of this. When the through experiments try to confirm the results, the depth information is present error information in the X and Y axes which can determine whether or not to pass through an obstacle has reliability.
A Method for Extracting Mosaic Blocks Using Boundary Features
Jang, Seok-Woo ; Park, Young-Jae ; Huh, Moon-Haeng ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2949~2955
DOI : 10.6109/jkiice.2015.19.12.2949
Recently, with the sharp increase of digital visual media such as photographs, animations, and digital videos, it has been necessary to generate mosaic blocks in a static or dynamic image intentionally or unintentionally. In this paper, we suggest a new method for detecting mosaic blocks contained in a color image using boundary features. The suggested method first extracts Canny edges in the image and finds candidate mosaic blocks with the boundary features of mosaic blocks. The method then determines real mosaic blocks after filtering out non-mosaic blocks using geometric features like size and elongatedness features. Experimental results show that the proposed method can detect mosaic blocks robustly rather than other methods in various types of input images.
Finger-Gesture Recognition Using Concentric-Circle Tracing Algorithm
Hwang, Dong-Hyun ; Jang, Kyung-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2956~2962
DOI : 10.6109/jkiice.2015.19.12.2956
In this paper, we propose a novel algorithm, Concentric-Circle Tracing algorithm, which recognizes finger's shape and counts the number of fingers of hand using low-cost web-camera. We improve algorithm's usability by using low-price web-camera and also enhance user's comfortability by not using a additional marker or sensor. As well as counting the number of fingers, it is possible to extract finger's shape information whether finger is straight or folded, efficiently. The experimental result shows that the finger gesture can be recognized with an average accuracy of 95.48%. It is confirmed that the hand-gesture is an useful method for HCI input and remote control command.
Analysis of Cross-Phase Modulation using a periodic signal in a Single-Mode Fiber
Lee, Jong-Hyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2963~2967
DOI : 10.6109/jkiice.2015.19.12.2963
The pump-probe scheme is used to analyze the cross-phase modulation penalty of a single-mode fiber in a WDM system. The pump signal is assumed to be a periodically modulated input like a raised sinusoidal. The periodic signal models an alternating bit sequence, and leads to an analytical expression of CPM penalty which is measured by EOP. The derived expression shows good agreement with numerical results in conventional single-mode fiber systems over a wide range of channel spacing,
. In dispersion-shifted fiber systems when
< 100GHz, the derived expression shows increased discrepancy with the numerical results due to the increased FWM. This is not a surprising because the pump-probe scheme is used to analyze system performance degradation due to CPM.
Analysis of Nonlinear CA Using CLT
Kwon, Min-jeong ; Cho, Sung-jin ; Kim, Han-doo ; Choi, Un-sook ; Lee, Kue-jin ; Kong, Gil-tak ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2968~2974
DOI : 10.6109/jkiice.2015.19.12.2968
Method for finding the attractors is the important object to investigate in the linear/additive CA because it is a primary interest in applications like pattern recognition, pattern classification, design of associative memory and query processing etc. But the research has been so far mostly concentrated around linear/additive CA and it is not enough to modelize the complex real life problem. So nonlinear CA is demanded to devise effective models of the problem and solutions around CA model. In this paper we introduce CLT as an upgraded version of RMT and provide the process for finding the attractors and nonreachable states effectively through the CLT.
A Study on Edge Detection using Gray-Level Transformation Function
Lee, Chang-Young ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2975~2980
DOI : 10.6109/jkiice.2015.19.12.2975
Edge detection is one of image processing techniques applied for a variety of purposes in a number of areas and it is used as a necessary pretreatment process in most applications. Detect this edge has been conducted in various fields at domestic and international. In the conventional edge detection methods, there are Sobel, Prewitt, Roberts and LoG, etc using a fixed weights mask. Since conventional edge detection methods apply the images to the fixed weights mask, the edge detection characteristics appear somewhat insufficient. Therefore in this study, to complement this, preprocessing using gray-level transformation function and algorithm finding final edge using maximum and minimum value of estimated mask by local mask are proposed. And in order to assess the performance of proposed algorithm, it was compared with a conventional Sobel, Roberts, Prewitt and LoG edge detection methods.
Resource Augmentation Analysis on Broadcast Scheduling for Requests with Deadlines
Kim, Jae-hoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2981~2986
DOI : 10.6109/jkiice.2015.19.12.2981
In this paper, there are m servers to carry out broadcasts and the scheduling problem to serve the requests with deadlines is studied. If a server broadcasts a page, then all the requests which require the page are satisfied. A scheduling algorithm shall determine which pages are broadcasted on servers at a time. Its goal is to maximize the sum of weights of requests satisfied within their deadlines. The performance of an on-line algorithm is compared with that of the optimal off-line algorithm which can see all the inputs in advance. In general, the off-line algorithms outperform the on-line algorithms. So we will use the resource augmentation analysis in which the on-line algorithms can utilize more resources. We consider the case that the on-line algorithms can use more servers in this paper.
Development of Framework for Support System on Outfitting Design of Ships
Park, Min-Gil ; Kim, Wan Kyoo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2987~2992
DOI : 10.6109/jkiice.2015.19.12.2987
In this paper, we propose the framework under a standardized task configuration to improve data accuracy and to provide unified system for the outfitting production design in shipyards. Due to the mismatching engineering data, the wrong designs or drawings were produced. With these wrong information, the production process can be broken and faced a big problem during production stage. In this study, we propose novel framework and its components which can offer better supporting for the design task and its process to improve productivity and efficiency with knowledge based engineering support system.
The problems for the usage and practical application of INCOTERMS 2010 in international trade contracts
Kim, Hae-suk ; Jang, Jae-hun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 2993~3002
DOI : 10.6109/jkiice.2015.19.12.2993
INCOTERMS 2010 apply to the International Trade Contract for the last 5 years. The export trade condition and the document type for last 10 years was researched to analysis of the practical problems of INCOTERMS 2010 application. The result of the research; First, several rules which are against the official INCOTERMS 2010 rules are used. Second, the conventional rules like FAS FOB, CIF and CFR which are used for the ocean and inland transportation are applied without any changes. Third, the issue of the time of delivery(transfer of ownership) at the CPT and CIP affects not to activate these two rules. Fourth, the frequency of the DAT use is low. Because, the terminal designate is hard at the point of the contract and the terminal is changeable during the transport. According to these issues, the active publicity campaign is needed for the INCOTERMS 2010. And, the analysis of the terms and the solution of conflict are also needed.
A study on correlation between media engagement and brand attachment, brand loyalty in an digital environment: Hierarchical Mediated regression analysis of Brand Relations Affect
Choo, Mi-ae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 3003~3010
DOI : 10.6109/jkiice.2015.19.12.3003
In this study, consumer to use digital media is investigated on media engagement, Brand Attachment, Brand Relations Affect and Brand Loyalty of relation. also analyzing the mediating effect of brand relations affect and brand influence in the relationship between media engagement and brand attachment step has its purpose. Data analysis result showed that media engagement is significant effect on Brand Relations Affect and Brand Attachment, Brand relations Affect and Brand Attachment is significantly effected on the brand loyalty. And mediating Effect of brand Relation Affect was investigated by adjusting role between media engagement and brand attachment. Media engagement and brand relations, the influence of the brand attachment, brand relations affect has a greater effect.
Construction of Large Library of Protein Fragments Using Inter Alpha-carbon Distance and Binet-Cauchy Distance
Chi, Sang-mun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 12, 2015, Pages 3011~3016
DOI : 10.6109/jkiice.2015.19.12.3011
Representing protein three-dimensional structure by concatenating a sequence of protein fragments gives an efficient application in analysis, modeling, search, and prediction of protein structures. This paper investigated the effective combination of distance measures, which can exploit large protein structure database, in order to construct a protein fragment library representing native protein structures accurately. Clustering method was used to construct a protein fragment library. Initial clustering stage used inter alpha-carbon distance having low time complexity, and cluster extension stage used the combination of inter alpha-carbon distance, Binet-Cauchy distance, and root mean square deviation. Protein fragment library was constructed by leveraging large protein structure database using the proposed combination of distance measures. This library gives low root mean square deviation in the experiments representing protein structures with protein fragments.