Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 19, Issue 12 - Dec 2015
Volume 19, Issue 11 - Nov 2015
Volume 19, Issue 10 - Oct 2015
Volume 19, Issue 8 - Aug 2015
Volume 19, Issue 9 - Aug 2015
Volume 19, Issue 7 - Jul 2015
Volume 19, Issue 6 - Jun 2015
Volume 19, Issue 5 - May 2015
Volume 19, Issue 4 - Apr 2015
Volume 19, Issue 3 - Mar 2015
Volume 19, Issue 2 - Feb 2015
Volume 19, Issue 1 - Jan 2015
Selecting the target year
Economic ripple effect and growth contribution of information security industry
Kim, Pang-ryong ; Hong, Jae-pyo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1031~1039
DOI : 10.6109/jkiice.2015.19.5.1031
This study examines the economic ripple effect on the domestic information security manufacturing and service sectors through input-output analysis. The production inducement coefficient of the manufacturing sector is bigger than the average of whole industry, but that of the service sector is smaller than the average. On the other hand, the service sector is superior to the manufacturing sector in the value added and employment inducement coefficients. Forward and backward linkage effects of manufacturing and service sectors are generally lower than those of the average of whole industry. The information security industry has insignificant contribution to national economy and employment growth overall. In particular, the manufacturing sector records minus contribution to employment growth, which means that a lot of effort for increasing employment must be given further on in the sector.
Development and prospect of Smart EMW Absorber for Protection of Electronic Circuits and Devices with Heat Radiating Function
Kim, Dong Il ; Park, Soo Hoon ; Joo, Yang Ick ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1040~1046
DOI : 10.6109/jkiice.2015.19.5.1040
With the rapid progress of electronics and radio communication technology, human enjoys greater freedom in information communication. However, EMW (Electro-Magnetic Wave) environments have become more complicate and difficult to control. Thus, international organizations, such as the American National Standard Institution (ANSI), Federal Communications Commission (FCC), the Comite Internationale Special des Perturbations Radio Electrique (CISPR), etc, have provided standard for controlling the EM wave environments and for the countermeasure of the electromagnetic compatibility (EMC). In this paper, the status of EMW absorbers and the goal of smart EMW absorber in the future were described. Furthermore, design method of the smart EM wave absorber with heat radiating function was suggested. The designed smart EM wave absorber has the absorption ability of more than 20 dB from 2 GHz to 2.45 GHz band, the optimum aperture (hole) size, the adjacent hole space, and the thickness of which were 6 mm, 9 mm, and 6.5 mm, respectively. Thus, it is respected that these results can be applied as various EMC devices in electronic, communication, and controlling systems.
Acoustic Model Transformation Method for Speech Recognition Employing Gaussian Mixture Model Adaptation Using Untranscribed Speech Database
Kim, Wooil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1047~1054
DOI : 10.6109/jkiice.2015.19.5.1047
This paper presents an acoustic model transform method using untranscribed speech database for improved speech recognition. In the presented model transform method, an adapted GMM is obtained by employing the conventional adaptation method, and the most similar Gaussian component is selected from the adapted GMM. The bias vector between the mean vectors of the clean GMM and the adapted GMM is used for updating the mean vector of HMM. The presented GAMT combined with MAP or MLLR brings improved speech recognition performance in car noise and speech babble conditions, compared to singly-used MAP or MLLR respectively. The experimental results show that the presented model transform method effectively utilizes untranscribed speech database for acoustic model adaptation in order to increase speech recognition accuracy.
Development of Wave Monitoring System using Precise Point Positioning
Song, Se Phil ; Cho, Deuk Jae ; Park, Sul Gee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1055~1062
DOI : 10.6109/jkiice.2015.19.5.1055
A GPS based wave height meter system is proposed in this paper. The proposed system uses a dual-frequency measurements, a precise GPS satellite information and a PPP-based navigation algorithm to estimate the position with high accuracy. This method does not need to receive corrections from the reference stations. Therefore, unlike RTK based wave meter, regardless of the distance to the reference stations, it is possible to estimate position with high accuracy. This system is very simple and accurate system, but accelerometer-based system requires the other sensors such as GPS. Because position error is accumulated in the accelerometer system and must be removed periodically for high accuracy. In order to get the measurements and test the proposed wave height meter system, a buoy equipped with the test platform is installed on the sea near by Jukbyeon habor in Uljin, Korea. Then, to evaluate the performance, compares built-in commercial wave height meter with proposed system.
A User Scheduling with Interference-Aware Power Control for Multi-Cell MIMO Networks
Cho, Moon-Je ; Ban, Tae-Won ; Jung, Bang Chul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1063~1070
DOI : 10.6109/jkiice.2015.19.5.1063
In this paper, we propose a distributed user scheduling with transmit power control based on the amount of generating interference to other base stations (BSs) in multi-cell multi-input multi-output (MIMO) networks. Assuming that the time-division duplexing (TDD) system is used, the interference channel from users to other cell BSs is obtained at each user. In the proposed scheduling, each user first generates a transmit beamforming vector by using singular value decompositon (SVD) over MIMO channels and reduces the transmit power if its generating interference to other BSs is larger than a predetermined threshold. Each BS selects the user with the largest effective channel gains among users, which reflects the adjusted power of users. Simulation results show that the proposed technique significantly outperforms the existing user scheduling algorithms.
Wired and Wileless Dualization Algorithm for Tension Sensing Smart Fence System
Kim, Jang-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1071~1076
DOI : 10.6109/jkiice.2015.19.5.1071
This paper proposed an efficient algorithm for tension sensing smart fence system with wireless sensor transmission module installation and alarming services. The wired transmission system demonstrates high accuracy and low latency, but the cost is expensive and transmission error may occur. For these reasons, this paper presented to use wireless transmission communication using Zigbee module technology in order to decrease delay and latency and solve the battery issues.
A Feasibility Study on Opportunistic Interference Alignment: Improved Energy Efficiency via Power Control
Shin, Won-Yong ; Yoon, Jangho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1077~1083
DOI : 10.6109/jkiice.2015.19.5.1077
In this paper, we introduce an energy-efficient opportunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multi-cell uplink networks. Each user employs optimal transmit vector design and power control in the sense of minimizing the amount of generated interference to other-cell base stations while satisfying a required signal quality. As our main result, it is shown that owing to the reduced interference level, the proposed OIA schemes attains larger sum-rates than those of OIA with no power control for almost all signal-to-noise ratio regions. In addition, when both zero-forcing and minimum mean square error (MMSE) detectors are employed at the receiver along with the OIA scheme, it is shown that the OIA scheme with MMSE detection shows superior performance.
Sensor Node Deployment in Wireless Sensor Networks Based on Tabu Search Algorithm
Jang, Kil-woong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1084~1090
DOI : 10.6109/jkiice.2015.19.5.1084
In this paper, we propose a Tabu search algorithm to efficiently deploy the sensor nodes for maximizing the network sensing coverage in wireless sensor networks. As the number of the sensor nodes in wireless sensor networks increases, the amount of calculation for searching the solution would be too much increased. To obtain the best solution within a reasonable execution time in a high-density network, we propose a Tabu search algorithm to maximize the network sensing coverage. In order to search effectively, we propose some efficient neighborhood generating operations of the Tabu search algorithm. We evaluate those performances through some experiments in terms of the maximum network sensing coverage and the execution time of the proposed algorithm. The comparison results show that the proposed algorithm outperforms other existing algorithms.
Efficient Multi-hop Resource Reservation Scheme in WiMedia D-MAC for Multi-hop N-Screen Services
Hur, Kyeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1091~1096
DOI : 10.6109/jkiice.2015.19.5.1091
In this paper, WiMedia Distributed-MAC protocol is adopted for development of multi-hop N-screen wireless services. Furthermore, to provide the multi-hop OSMU (One Source Multi Use) N-screen service through P2P streaming in the D-MAC protocol, a new multi-hop resource reservation scheme is proposed and analyzed to reduce end to end delay. For this Multi-hop resource reservation scheme, a new MSCDRP (Multi-Stage Cooperative DRP) IE is proposed. Simulation results show that our multi-hop MSCDRP scheme reduces the end to end delay and increases throughput at various multi-hop N-screen network environment.
Wired/Wireless Gateway System Supporting LAN-to-LAN VPN with Multi-Queuing Realtime Traffic Shaping
Yang, Seung Eui ; Goh, Byung Oh ; Choi, Jong-Kun ; Jung, Hoe-kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1097~1103
DOI : 10.6109/jkiice.2015.19.5.1097
In order to build network infrastructure to implement the aforementioned advantages enabling smart device users to work anywhere, professional support and expensive VPN devices are required. This is a barrier to supplying VPN devices to small and medium-sized institutes. To address this issue, this study aims to implement OpenVPN, OpenSSH and iproute based on the OpenWRT platform which is an embedded OS for open networks in affordable open wired/wireless gateway H/W platforms to support the inter-network VPN. In addition, the network environment can be maintained optimal by applying a "multi-queuing real-time traffic shaping technology" to VPN tunnels, although channel quality changes.
A proposal of binary sequence generator, Threshold Clock-Controlled LM-128
Jo, Jung-bok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1104~1109
DOI : 10.6109/jkiice.2015.19.5.1104
Due to the rapid growth in digital contents, it is important for us to design a high speed and secure encryption algorithm which is able to comply with the existing and future needs. This paper proposes an alternative approach for self-decimated LM-128 summation sequence generator, which will generate a higher throughput if compared to the conventional generator. We design and implement a threshold clock-controlled LM-128 and prove that it has a lower clock cycle and hence giving a higher key stream generation speed. The proposed threshold clock-control LM-128 generator consists of 256 bits inner state with 128 bits secret key and initialization vector. The cipher achieves a security level of 128 bits to be adapted to the digital contents security with high definition and high quality.
Analysis of Global Research Trend on Information Security
Kim, Won-pil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1110~1116
DOI : 10.6109/jkiice.2015.19.5.1110
This paper analyzes global research trend on information security. All technical fields based on information requires security so that discovering technologies (technical terms) which are developing newly or dramatically is able to guide the future direction of the field of information security. In this paper, the ultimate of this research is to figure out the technologies related to information security and to forecast the future through understanding their trends. The paper, as a beginning for the analysis on macroscopic viewpoint, contains measurement of yearly relatedness between technical terms from 2001 to 2014 by using temporal co-occurrence and interpretation of its meaning through comparing the relatedness with trends of top-related technical terms. And to conclude, we could find that Android platform, Big data, Internet of things, Mobile technologies, and Cloud computing are emerging technologies on information security.
A Study of Improved Session Management for Mobile Web under BYOD environment
Kim, Young-hun ; Park, Yongsuk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1117~1124
DOI : 10.6109/jkiice.2015.19.5.1117
This paper explains a web session management system for mobile web environment with BYOD(Bring Your Own Device). This system operates by enhanced secure session token. This system consists of an unique identifier, time stamp, and encryption algorithm. The Unique identifier in this system classifies each mobile device for web security based on mobile environment with BYOD. And the Time stamp in this system that determine session effectiveness for web security. Also the Cipher algorithm in this system that protects session token information for web security. This paper analysis a security of session management system running on mobile web environment using the simulation techniques. The proposed method is more suitable than the other methods under enviroment mobile web environment with BYOD.
A Study on Security Attribute Design in Security Plan of The Design Phase
Shin, Seong-Yoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1125~1130
DOI : 10.6109/jkiice.2015.19.5.1125
In this paper, a method to identify components per unit task system is expressed with node, module, and interface. We define security subject per unit task system and explain node, module, and interface per component. According to the defined security standard in design phase, we also perform to design and elaborate security attributes for node and module as identified security subjects in their defined tables. And then we describe the composition standard for security attribute design with some examples, after classifying it into security subject, access subject, access control area, identification or verification area, and encryption.
IP-PBX System of RasPBX-Based
Jeong, Dae-Jin ; Song, Hyun-Ok ; Jung, Hoe-kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1131~1136
DOI : 10.6109/jkiice.2015.19.5.1131
VoIP and IP Telephony telephony technology development is a growing by easy to using IP-PBX by using phone from using existing lines rather than the internet. IP-PBX do not use the phone line from phone work for many companies and institutions of management costs reduce as provides similar to regular phone line quality. But IP-PBX to introduce for need to be the initial cost on is should buy for expensive hardware equipment or commercial software. In this paper, suggest way to introduce IP-PBX do not buy expensive hardware equipment or commercial software. Suggest IP-PBX on designed and implement for IP-PBX server using Raspberry Pi and Asterisk. And verification treatise on the suitability of conducted by voice calls based on IP-PBX between PC and a Smartphone
A New Filtering System against the Disclosure of Sensitive Internal Information
Ju, Tae-kyung ; Shin, Weon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1137~1143
DOI : 10.6109/jkiice.2015.19.5.1137
Sensitive internal information has been transmitted in a variety of services of Internet environment, but almost users do not know what internal information is sent. In this paper, we intend to develop a new filtering system that continuously monitors the sensitive information in outbound network packets and notifies the internal user whether or not to expose. So we design a filtering system for sensitive information and analyze the implementation results. Thus users visually can check whether disclosure of the important information and drop the corresponding packets by the proposed system. The results of this study can help decrease cyber threats various targeting internal information of company by contributing to prevent exposure of sensitive internal information.
A New XMPP/SIP Presence Service System by Multiple Servers Architecture
Lee, Ky-Soo ; Jang, Choonseo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1144~1150
DOI : 10.6109/jkiice.2015.19.5.1144
Presence information provides various informations about users such as on-line status, current location, network connection method and connection address, and there are two kinds of presence information, SIP(Session Initiation Protocol) based presence information and XMPP(Extensible Massaging and Presence Protocol) based presence information. In this paper, a multiple server architecture that can handle these two kinds of presence information has been proposed. In this architecture, severs are added dynamically according to number of users to provide system scalability, and load of each server can be effectively controlled. In this system, a new XMPP stanza architecture and presence information data format are designed for load control. Furthermore message exchanging procedures between servers and users for dynamic server control has been also suggested. The performance of the proposed system has been analysed by simulation.
A Study on Registration Data Analysis of National Immunization Registry Information System
Kim, Chang-su ; Park, Ok ; Kim, Mi-young ; Kim, Myung-jin ; Lee, Sok-goo ; Jung, Hoe-kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1151~1156
DOI : 10.6109/jkiice.2015.19.5.1151
In this study, the accuracy duplication and register rate of the vaccination registration data in National Immunization Registry Information System were evaluated and analyzed. Through which undocumented vaccination status data, duplicate data, missing data, errors data into the vaccination registration data were analyzed. In addition, the quality control for the vaccination registration database quality improvement, were proposed for standard error checking. In this paper, we propose an efficient validation of a quality management system of the database.
Verification method for 4x4 MIMO algorithm implementation and results
Choi, Jun-su ; Hur, Chang-wu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1157~1162
DOI : 10.6109/jkiice.2015.19.5.1157
This paper is the design and implementation to the 4x4 MIMO algorithm based on OFDM, and presented how to verify the implemented result. Algorithm applied the MRVD and QRM-MLD. Matlab and Simulink are used to design channel presumption & MIMO algorithm by Floating-point and Fixed-point model. After then implement VHDL using Modelsim. Performance of algorithm is checked by comparing Simulink model, Modelsim simulation, ISE ChipScope with the result measured by oscilloscope. This method is useful to verify an algorithm with uncompleted system. Conformance between the result of ChipScope and the result of oscilloscope is confirmed, it could be applied on the Backhaul system.
Design and Implementation of MQTT Based Real-time HVAC Control Systems
Jung, Hun ; Park, Chong-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1163~1172
DOI : 10.6109/jkiice.2015.19.5.1163
In this paper, an MQTT based protocol is designed and implemented for control, management and monitoring of HVAC in a cloud platform in real time. The MQTT protocol is a two-way messaging protocol, and has the generality, flexibility, light weighted, quickness with reliability and security. In the implemented system, performance and reliability of the communication protocol is considered for data acquisition and control between the CCU and the cloud server. Control and monitoring for the cloud server is performed in real time in conjunction with CCU and the MQTT server.
A Research and development of integrated Platform for data security between different smart home devices
Lee, Jeong-Gi ; Yang, Chul-Seung ; Kim, Jun-Ha ; Kim, Kang-Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1173~1179
DOI : 10.6109/jkiice.2015.19.5.1173
In this paper is given to implements the Android-based integration platform to provide convenience for gender development and scalability , easy access for the user. Sensor-based smart home-related products have a different way of the data exchange so platform can be integrated easily and connect heterogeneous network products and external data transmission security processing for data communication and supported to enable the integration
Quad-tree Subband Quantizer Design for Digital Hologram Encoding based on Fresenelet
Seo, Young-Ho ; Kim, Moon Seok ; Kim, Dong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1180~1188
DOI : 10.6109/jkiice.2015.19.5.1180
In this paper, we propose a new subband quantizer which is a type of quad-tree for applying to digital hologram compression based on Fresenelet transform. After executing Fresnelet transform to the captured digital holgoram, we analyze effect of the designed quantizer for the reconstructed objects from analyzing average energy of each coefficient and visual importance in all subbands. We analyze distribution of coefficient and set dynamic range for each subband, and then design subband quantizer. For enhancing effectiveness of the designed quantize, we adopt a method using the coefficients which are located out of dynamic range, which are named by exception indices. From this, we can obtain more effective quantizer which has higher performance in a range of σ′ = 5.0.
Analysis of Intra Prediction for Digital Watermarking based on HEVC
Seo, Young-Ho ; Kim, Bora ; Kim, Dong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1189~1198
DOI : 10.6109/jkiice.2015.19.5.1189
Recently, with rapid development of digital broadcasting technology, high-definition video service increased interest and demand. supplied mobile and image device support that improve 4~16 time existing Full HD. Such as high-definition contents supply, proposed compression for high-efficiency video codec (HEVC). Therefore, watermarking technology is necessary applying HEVC for protecting ownership and intellectual property. In this paper, analysis of prediction mode in intra frame and study feasibility of watermarking in re-encoding based HEVC. Proposed detect un-changed blocks in intra frame, using the result of analysis prediction mode.
Automatic Pose similarity Computation of Motion Capture Data Through Topological Analysis
Sung, Mankyu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1199~1206
DOI : 10.6109/jkiice.2015.19.5.1199
This paper introduces an algorithm for computing similarity between two poses in the motion capture data with different scale of skeleton, different number of joints and different joint names. The proposed algorithm first performs the topological analysis on the skeleton hierarchy for classifying the joints into more meaningful groups. The global joints positions of each joint group then are aggregated into a point cloud. The number of joints and their positions are automatically adjusted in this process. Once we have two point clouds, the algorithm finds an optimal 2D transform matrix that transforms one point cloud to the other as closely as possible. Then, the similarity can be obtained by summing up all distance values between two points clouds after applying the 2D transform matrix. After some experiment, we found that the proposed algorithm is able to compute the similarity between two poses regardless of their scale, joint name and the number of joints.
Three-Dimensional Visualization and Recognition of Micro-objects using Photon Counting Integral Imaging Microscopy
Cho, Myungjin ; Cho, Giok ; Shin, Donghak ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1207~1212
DOI : 10.6109/jkiice.2015.19.5.1207
In this paper, we propose three-dimensional (3D) visualization and recognition techniques of micro-objects under photon-starved conditions using photon counting integral imaging microscopy. To capture high resolution 2D images with different perspectives in the proposed method, we use Synthetic Aperture Integral Imaging (SAII). Poisson distribution which is mathematical model of photon counting imaging system is used to extract photons from the images. To estimate 3D images with 2D photon counting images, the statistical estimation is used. Therefore, 3D images can be obtained and visualized without any damage under photon-starved conditions. In addition, 3D object recognition can be implemented using nonlinear correlation filters. To prove the usefulness of our technique, we implemented the optical experiment.
The Development of the Writing Software for the Electronic Blackboard Supporting the User Action Recognition Functions
Choi, Yun-Su ; Jung, Jin-Uk ; Hwang, Min-Tae ; Jin, Kyo-Hong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1213~1220
DOI : 10.6109/jkiice.2015.19.5.1213
By the dissemination of the electronic blackboard systems, smart devices, and digital contents, the Korean government is recently conducting the project that replaces the classic education which utilizes paper textbooks with SMART education using various devices. Also, teachers in the field must be easily able to use SMART education infrastructure for the activation of SMART education. Especially, since the electronic blackboard is expected as a education device which will be most common for teachers, the writing software operated on the this device must supports a simple interface. And the usage of it must be simple. In this paper, we developed the writing software for the electronic blackboard which everyone can use easily. Our writing software supports the basic writing function, the human gesture recognition function which recognizes the user gesture and performs works corresponding with that gesture, and the automatic button alignment function based on the frequency of the usages.
A Study on Edge Detection using Modified Histogram Equalization
Lee, Chang-Young ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1221~1227
DOI : 10.6109/jkiice.2015.19.5.1221
Edge detection is one of the important technologies to simplify images in the text, lane and object recognition implementation process, and various studies are actively carried out at home and abroad. Existing edge detection methods include a method to detect edge by applying directional gradient masks in spatial space, and a mathematical morphology-based edge detection method. These existing detection methods show insufficient edge detection results in excessively dark or bright images. In this regard, to complement these drawbacks, we proposed an algorithm using the Sobel and histogram equalization among the existing methods.
Development of Fuzzy Controller for Temperature Environment Tester Using Thermoeletric Module
Hwang, Gi-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1228~1234
DOI : 10.6109/jkiice.2015.19.5.1228
In this paper, a fuzzy controller using thermoelectric for temperature environmental tester is developed. The new structure of fuzzy controller based temperature environmental tester is proposed and implemented to maintain a stable temperature and improve temperature change speed. In order to evaluate the efficiency, an experiment is setup to compare PID controller with our proposed controller. The experimental results, we proved that our proposed fuzzy controller has better performance than PID controller.
Development of Simulation System For Real-Time Location Tracking In Global Shipping Logistics
Park, Byung-Kwon ; Choi, Hyung-Rim ; Kim, Chae-Soo ; Lee, Kang-bae ; Park, Min-Seon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1235~1242
DOI : 10.6109/jkiice.2015.19.5.1235
In global shipping logistics, it is important for users to keep track of the location of their continuously moving cargos. Analyzing the GPS data stream coming from the tag which is attached to the cargo, we are able to keep track of the cargo location in terms of going into or out of a certain logistics area using the information of the spatial relationship change between the tag and the logistics area. In this paper, we propose a simulation system for measuring the precision and false alarm rate of the cargo location tracking algorithm which generates spatial events over the global logistics areas. Due to the difficulty of experiment with a real tag, we developed a tag emulator to create a virtual tag which operates exactly like a real tag. We show the cargo location tracking system works correctly with the tag emulator which communicates with it using the same protocol as the real tag.
Effective Recognition of Velopharyngeal Insufficiency (VPI) Patient's Speech Using Simulated Speech Model
Sung, Mee Young ; Kwon, Tack-Kyun ; Sung, Myung-Whun ; Kim, Wooil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1243~1250
DOI : 10.6109/jkiice.2015.19.5.1243
This paper presents an effective recognition method of VPI patient's speech for a VPI speech reconstruction system. Speaker adaptation technique is employed to improve VPI speech recognition. This paper proposes to use simulated speech for generating an initial model for speaker adaptation, in order to effectively utilize the small size of VPI speech for model adaptation. We obtain 83.60% in average word accuracy by applying MLLR for speaker adaptation. The proposed speaker adaptation method using simulated speech model brings 6.38% improvement in average accuracy. The experimental results demonstrate that the proposed speaker adaptation method is highly effective for developing recognition system of VPI speech which is not suitable for constructing large-size speech database.
A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea
Park, Chan-soo ; Park, Yongsuk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1251~1258
DOI : 10.6109/jkiice.2015.19.5.1251
Recently, as the development of cyber weapons, the threat of cyber warfare has been increasing. Nations, which experienced cyber warfare already, have been damaged not only in the cyber space as well as in real war field. Therefore, each nation is constantly making efforts to prepare for cyber warfare. First of all, to prepare for cyber warfare, each nation's capability of cyber warfare should be understood. A plan of reaction of cyber warfare should be searched by comparison and analysis of capability of cyber warfare. This paper compares and analyzes established methodology of capability assessment about cyber warfare, and this paper finds a better point to suggest the improvement of capability assessment about cyber warfare. This paper applies capability assessment of cyber warfare to nations, which can influence on Korea with improved capability assessment of cyber warfare. Comparing and analyzing the result of assessment, this paper deducts complementary point of Korean cyber warfare to suggest the plan to enhancing capability of cyber warfare.
Analysis of Differences between the Sonic Layer Depth and the Mixed Layer Depth in the East Sea
Lim, Sehan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1259~1268
DOI : 10.6109/jkiice.2015.19.5.1259
The sonic layer depth (SLD) variability is important for understanding the acoustic properties of the upper ocean that influence acoustic communications, acoustic tomography, and naval operations related to searching and detecting marine underwater vessels. Generally, the SLD is the acoustical equivalent of the mixed layer depth (MLD), although they are defined differently. In this study the SLD was compared with the MLD over the annual cycle in the East Sea using an available set of temperature-salinity observation profiles. For the comparison, various definitions and methods of the MLD had applied. As a result, the SLD in the East Sea is slight similar to the curvature method applied MLD, but the other MLD have severe differences with the SLD. Futhermore, a parabolic equation transmission model is used to evaluate the cutoff frequency trapped in surface duct. It follow that there is an optimum frequency for propagation at which the loss of sound is minimum.
A Development of 3D Modeling-based Survivability Analysis System for Armored Fighting Vehicle using Importance of Components
Hwang, Hun-Gyu ; Lee, Jae-Wook ; Lee, Jae-Woong ; Lee, Jang-Se ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 5, 2015, Pages 1269~1276
DOI : 10.6109/jkiice.2015.19.5.1269
The mission capability of tank depends on its survivability. The survivability is ability for protection and tolerance by damage from threats. To improve the survivability of tank, we need an effectiveness analysis for loss of components, and accomplish performance enhancement using the result of analysis. In this paper, we develop a survivability analysis system for tank based on the importance. The importance numerically represents weight of each component which consisting of whole tank, also the importance is basic method of quantitative survivability analysis. To do this, we assign weight values to each component of tank, compose a weight tree, apply the importance calculation equation, and analyze the survivability of tank. Also we develop the system that consists of component structuralization and weight value setting program and survivability analysis and visualization program, and evaluate the system using implemented 3D CAD models of components of tank. The developed system apply to arrangement components.