Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 19, Issue 12 - Dec 2015
Volume 19, Issue 11 - Nov 2015
Volume 19, Issue 10 - Oct 2015
Volume 19, Issue 8 - Aug 2015
Volume 19, Issue 9 - Aug 2015
Volume 19, Issue 7 - Jul 2015
Volume 19, Issue 6 - Jun 2015
Volume 19, Issue 5 - May 2015
Volume 19, Issue 4 - Apr 2015
Volume 19, Issue 3 - Mar 2015
Volume 19, Issue 2 - Feb 2015
Volume 19, Issue 1 - Jan 2015
Selecting the target year
Characteristics of Antenna Factor for a Calculable Dipole Antenna above Ground Plane in 1~3 GHz Frequency Band
Lim, Sung-Min ; Kim, Sang-Myung ; Jung, Sung-Woo ; Kim, Ki-Chai ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 1991~1998
DOI : 10.6109/jkiice.2015.19.9.1991
This paper presents the antenna factor characteristics of a calculable dipole antenna with a hybrid balun, installed above ground plane vertically and horizontally, using Method of Moments (MoM). An expression for the antenna factor is formulated using the concept of power mismatch loss. The input impedance and effective length of the antenna, which are in the formula of the antenna factor, are calculated using the MoM. The results show that the antenna factors above a ground plane are agreed with the free space antenna factors within ± 0.14 dB. The horizontal antenna factors are varied more by 0.2 dB than the vertical antenna factors.
A Study on Improvement of Doppler Frequency Estimation Method in a Weather Radar
Lee, Jonggil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 1999~2005
DOI : 10.6109/jkiice.2015.19.9.1999
A wind velocity is measured in a weather radar as well as the strength of return echoes from rain clouds. These wind velocities are obtained through estimation of Doppler frequencies in return signals. This kind of Doppler frequency estimation method is called as a correlation method. It is widely used in most weather radars because of less computation time. However, it may cause serious errors if a spectrum is not symmetric. Therefore, in this paper, it is shown that the improved method using 3
order phase estimation model yields the more accurate estimation of the average Doppler frequency using various simulated weather data.
Design and Implementation of Finger Language Translation System using Raspberry Pi and Leap Motion
Jeong, Pil-Seong ; Cho, Yang-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2006~2013
DOI : 10.6109/jkiice.2015.19.9.2006
Deaf are it is difficult to communicate to represent the voice heard, so theay use mostly using the speech, sign language, writing, etc. to communicate. It is the best way to use sign language, in order to communicate deaf and normal people each other. But they must understand to use sign language. In this paper, we designed and implementated finger language translation system to support communicate between deaf and normal people. We used leap motion as input device that can track finger and hand gesture. We used raspberry pi that is low power sing board computer to process input data and translate finger language. We implemented application used Node.js and MongoDB. The client application complied with HTML5 so that can be support any smart device with web browser.
Performance Comparison between Interference Minimization and Signal Maximization in Multi-Cell Random Access Networks
Jo, Han-Seong ; Jin, Hu ; Jung, Bang Chul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2014~2021
DOI : 10.6109/jkiice.2015.19.9.2014
Opportunistic interference alignment (OIA) has been proposed for multi-cell random access networks (RAN), which minimizes the generating interference to neighboring RANs and yields better performance compared with the conventional techniques. The OIA for RANs considers both physical (PHY) and medium access control (MAC) layers. In this paper, we introduce a protocol of which each user maximizes the transmit signal regardless of the generating interference to neighboring RANs, contrary to the OIA technique. In addition, we compare the performance of the signal-maximization technique with the OIA technique.
Analysis of transmission delay of timecode over SpaceWire network using OMNeT++
Ryu, Sang-Moon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2022~2028
DOI : 10.6109/jkiice.2015.19.9.2022
SpaceWire is a standard for high-speed links and networks between spacecraft components, which was invented for better, cheaper and faster on-board data handling in spacecraft. The standard defines timecode and its distribution which can be used for time synchronization among the nodes in a SpaceWire network. A timecode output from the time master which provides standard time over a SpaceWire network travels through links and routers to reach every nodes. While traveling, a timecode suffers from transmission delay and jitter which cause some difference in time synchronization among nodes. In this work, a simulator was developed using OMNeT++ to simulate the operation of a SpaceWire network and some analyses were performed on the transmission delay and jitter accompanied with a transmission of a timecode. The result will be used in the near future for the research of a precise time synchronization technique over a SpaceWire network.
A Development Study of The VPT for the improvement of Hadoop performance
Yang, Ill Deung ; Kim, Seong Ryeol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2029~2036
DOI : 10.6109/jkiice.2015.19.9.2029
Hadoop MR(MapReduce) uses a partition function for passing the outputs of mappers to reducers. The partition function determines target reducers after calculating the hash-value from the key and performing mod-operation by reducer number. The legacy partition function doesn't divide the job effectively because it is so sensitive to key distribution. If the job isn't divided effectively then it can effect the total processing time of the job because some reducers need more time to process. This paper proposes the VPT(Virtual Partition Table) and has tested appling the VPT with a preponderance of data. The applied VPT improved three seconds on average and we figure it will improve more when data is increased.
Mobile Agent Based Route Search Method Using Genetic Algorithm
Ji, Hong-il ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2037~2043
DOI : 10.6109/jkiice.2015.19.9.2037
Proposed algorithm in this thesis introduced cells, units of router group, to conduct distributed processing of previous genetic algorithm. This thesis presented ways to reduce search delay time of overall network through cell-based genetic algorithm. Also, through this experiment, in case of a network was damaged in existing optimal path algorithm, Dijkstra algorithm, the proposed algorithm was designed to route an alternative path and also as it has a 2nd shortest path in cells of the damaged network so it is faster than Dijkstra algorithm, The study showed that the proposal algorithm can support routing of alternative path, if Dijkstra algorithm is damaged in a network.
A Study on the Models of Internal system users Authentication considering Multi Factors
Lee, Jae-yun ; Shim, Ho-sung ; Han, Kyeong-Seok ; Choi, Yong-Lak ; Kim, Jong-bae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2044~2055
DOI : 10.6109/jkiice.2015.19.9.2044
Financial information systems play such a pivotal role in the financial institution services that are provided for a large customers on the basis of various information including the personal information. As for the personal information collected during the transactions in the financial information systems, huge efforts and investment have been made to protect previously them from being inappropriately misused or illegally used if they could be released. Unfortunately, the frequent accidents on the leakage of sensitive personal information have occurred recently not only by external service users but even by internal system users. Therefore, the aim of this study is to suggest a model of advanced two-channel authentication for internal users in order to increase the stability of financial information systems with enhanced security.
Multi-session authentication scheme for secure authentication and session management of cloud services environment
Choi, Do-hyeon ; Park, Jung-oh ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2056~2063
DOI : 10.6109/jkiice.2015.19.9.2056
Recently, as the service scale of cloud service is expanded, an anxiety due to concerns on new vulnerabilities and security related incidents and accidents are also increasing. This paper proposes a certification scheme for multiple session management of security sessions which are generated after the user authentication. The proposed session multiplexing scheme enables the independent management of security sessions in the level of virtualization (hypervisor) within the service provider. As a result of performance analysis, providing a strong safety due to session multiplexing and mutual authentication, and the superiority of performance was proven by comparing it with the existing mutual authentication encryption algorithms.
Web Service Performance Improvement with the Redis
Kim, Chul-Ho ; Park, Kyeong-Won ; Choi, Yong-Lak ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2064~2072
DOI : 10.6109/jkiice.2015.19.9.2064
To improve performance, most of Web Services produce and manage User Access Logs. Through the Access Logs, the record provides information about time when the most traffic happens and logs and which resource is mostly used. Then, the log can be used to analyze. However, in case of increasing high traffics of Web Services at the specific time, the performance of Web Service leads to deterioration because the number of processing User Access Logs is increasing rapidly. To solve this problem, we should improve the system performance, or tuning is needed, but it makes a problem cost a lot of money. Also, after it happens, it is not necessary to build such system by spending extra money. Therefore, this paper described the effective Web Service's performance as using improved User Access Log performance. Also, to process the newest data in bulk, this paper includes a method applying some parts of NoSQL using Redis.
A Design and Implementation of Needs Analysis System in Internet Shopping Mall
Park, Sung-hoon ; Kim, Jindeog ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2073~2080
DOI : 10.6109/jkiice.2015.19.9.2073
Even though users choose goods they want to buy in on-line shopping malls, real purchase is often performed in off-line shopping malls. It is called reverse showrooming. It means that users' analysis of goods based on images and description of internet shopping malls has limitation. Thus, large-scale online shopping malls provide a customized shopping information. However, in that case, the provided information is a simple list of goods users bought or retrieved. Thus, a system to analyze various needs of users and apply the result into on-line shopping mall is necessary. In this paper, an analysis system is proposed. The system contains a module to analyze user defined preference and a module to analyze users' reviews. The former designates two goods and collects preferences of individual users. the latter analyzes reviews about purchased goods based on database dictionary stored in advance for analyzing reviews. The system implemented shows that it is possible to recommend some goods that meet each users's needs
Design of CMOS Temperature Sensor Using Ring Oscillator
Choi, Jin-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2081~2086
DOI : 10.6109/jkiice.2015.19.9.2081
The temperature sensor using ring oscillator is designed by 0.18㎛ CMOS process and the supply voltage is 1.5volts. The temperature sensor is designed by using temperature-independent and temperature-dependent ring oscillators and the output frequency of temperature-independent ring oscillator is constant with temperature and the output frequency of temperature-dependent ring oscillator decreases with increasing temperature. To convert the temperature to a digital value the output signal of temperature-independent ring oscillator is used for the clock signal and the output signal of temperature-dependent ring oscillator is used for the enable signal of counter. From HSPICE simulation results, the temperature error is less than form -0.7℃ to 1.0℃ when the operating temperature is varied from -20℃ to 70℃.
The Development of Temperature Measurement System using Non-Contact Temperature Sensor Array
Kim, Sung-Dae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2087~2092
DOI : 10.6109/jkiice.2015.19.9.2087
Recently, use of the heat transferring machine and systems has been increasing in various industrial fields. A key technique for constructing such process is basically to measuring temperature directly to objects established on industrial plants. Particularly, a non-contact temperature measurement is very important to realize advanced heat transferring systems. This paper presents a new measurement methodology for temperature by using USN(ubiquitous sensor networks) technique including the microprocessor unit based ZigBee communication systems. This proposed system is made to be applied in monitoring systems for non-contact temperature measurement. We designed firmware based measurement systems whose main function is to save s series of temperature data sets and send it to main monitoring systems.
Real-Time Management System of Reefer Container based on IoT
Moon, Young-Sik ; Jung, Jun-Woo ; Choi, Sung-Pill ; Kim, Tae-Hoon ; Lee, Byung-Ha ; Kim, Jae-Joong ; Choi, Hyung-Lim ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2093~2099
DOI : 10.6109/jkiice.2015.19.9.2093
To prevent damage to the cargo, monitoring and remote management for reefer containers is necessary. The currently used remote monitoring service is the Power Cable Transmission(PCT) system, which is recommended by the International Maritime Organization(IMO). However, this system is not widely used because it requires a separate PCT infrastructure and is susceptible to data loss problems. To solve this problem, this study introduces the "IoT-based reefer container management system", The proposed system which is attached to reefer container collects and transmits data on the temperature, status and location of reefer container to middleware using RS-232 communication and WCDMA/GSM communication. Middleware is store the data received in the database and provide information to user in real time through the web and mobile program. At this time, users able to change setting temperature in real time from a distant place through the web program. This study tested by transit about shipment of strawberries to monitor and analyze and check the system's overall effectiveness.
Adaptive Situation of the wireless communication technology for the Medical Science Environment
Hwang, Jin-Ok ; Lee, Do-Yeon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2100~2106
DOI : 10.6109/jkiice.2015.19.9.2100
Recently, we are increasing an interest of the health care from the developing elderly society. The need for the safety standardization is the High-tech industry that the technology of Medical science based on advanced nations with the wireless communication technology. It is urgent matter the chronic disease that is growing the total costs is everyday increased. We consider the standardization of the monitoring the medical examination based on the medical science environment with wireless communication technology. In addition, we make the environment of the powerful nation based on medical / patient care technology for the supporting of the high quality service. In this paper, we focus on description of the relationship that convergence of the medical / patient care science is need the component based on wireless communication technology.
A Study on the Prior Forecast System of Crossroads Traffic Information based on Vehicle-IT for Decision Assistant
Lee, Yang Sun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2107~2113
DOI : 10.6109/jkiice.2015.19.9.2107
This paper proposed a Prior Forecast System of Crossroad Traffic Information that allows vulnerable road users to perceive traffic signal changes beforehand and respond in concentrated traffic areas such as crossroads. Also, it mapped out information linking procedures of the proposed system and it designed a PHY based wireless communication simulator to verify the operational feasibility of wireless communications. Conclusively, by conducting performance analysis according to crossroad channel environments using the simulator designed in this paper, it verified that a Prior Forecast System of Crossroads Traffic Information service for vehicle IT based decision-making support for vulnerable road users is a possibility.
A Design of Framework for Secure Communication in Vehicular Cloud Environment
Park, Jung-oh ; Choi, Do-hyeon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2114~2120
DOI : 10.6109/jkiice.2015.19.9.2114
Vehicle cloud technology is a fusion technology of vehicle communication technology and cloud computing used in wired and wireless Internet, and has attracted attention as a new IT paradigm. It is expected that it would contribute to resolve the road traffic problem with effective communication by providing computer, sensor, communication, device, and resource. but security is necessary to apply vehicle cloud environment and it have to resolve security threats and various attacks occurred in wired and wireless vehicle environment. Therefore, in this paper, we designed security framework to provide secure communication between vehicle and vehicle, and vehicle and the Road side in the vehicle cloud environment. Safety and security of the vehicle environment was satisfied with the security requirements of the vehicle and cloud-based environment, and increased efficiency than the conventional vehicle network communication protocols.
Barcode Region of Interest Extraction Method Using a Local Pixel Directions in a Multiple Barcode Region Image
Cho, Hosang ; Kang, Bongsoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2121~2128
DOI : 10.6109/jkiice.2015.19.9.2121
In this paper presents a method of extracting reliable and regions of interest (ROI) in barcode for the purpose of factory automation. backgrounds are separated based on directional components and the characteristics of detected patterns. post-processing is performed on candidate images with analysis of problems caused by blur, rotation and areas of high similarity. In addition, the resizing factor is used to achieve faster calculations through image resizing. The input images contained multiple product or barcode for application to diverse automation environments; a high extraction success rate is accomplished despite the maximum shooting distance of 80 cm. Simulations involving images with various shooting distances gave an ROI detection rate of 100% and a post-processing success rate of 99.3%.
Performance Improvement of Traffic Signal Lights Recognition Based on Adaptive Morphological Analysis
Kim, Jae-Gon ; Kim, Jin-soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2129~2137
DOI : 10.6109/jkiice.2015.19.9.2129
Lots of research and development works have been actively focused on the self-driving vehicles, locally and globally. In order to implement the self-driving vehicles, lots of fundamental core technologies need to be successfully developed and, specially, it is noted that traffic lights detection and recognition system is an essential part of the computer vision technologies in the self-driving vehicles. Up to nowadays, most conventional algorithm for detecting and recognizing traffic lights are mainly based on the color signal analysis, but these approaches have limits on the performance improvements that can be achieved due to the color signal noises and environmental situations. In order to overcome the performance limits, this paper introduces the morphological analysis for the traffic lights recognition. That is, by considering the color component analysis and the shape analysis such as rectangles and circles simultaneously, the efficiency of the traffic lights recognitions can be greatly increased. Through several simulations, it is shown that the proposed method can highly improve the recognition rate as well as the mis-recognition rate.
A Calibration Method for Multimodal dual Camera Environment
Lim, Su-Chang ; Kim, Do-Yeon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2138~2144
DOI : 10.6109/jkiice.2015.19.9.2138
Multimodal dual camera system has a stereo-like configuration equipped with an infrared thermal and optical camera. This paper presents stereo calibration methods on multimodal dual camera system using a target board that can be recognized by both thermal and optical camera. While a typical stereo calibration method usually performed with extracted intrinsic and extrinsic camera parameter, consecutive image processing steps were applied in this paper as follows. Firstly, the corner points were detected from the two images, and then the pixel error rate, the size difference, the rotation degree between the two images were calculated by using the pixel coordinates of detected corner points. Secondly, calibration was performed with the calculated values via affine transform. Lastly, result image was reconstructed with mapping regions on calibrated image.
Implementation of Image-based Virtual Fence for Surveillance Area Setup
Kim, Jae-jun ; Kim, Do-yeon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2145~2152
DOI : 10.6109/jkiice.2015.19.9.2145
The existing CCTV has limitation such as problem on usage of the off-line type of recorded image for specific investigation, and requirement on interactive operator intervention for real-time surveillance. Therefore, it is required to develop the intelligent CCTV equipped with various functionalities in order to overcome drawbacks mentioned above. In this paper, implementation methods of image-based virtual fence were proposed by using the spline curves with supplied control for setup of surveillance area. In addition, pre-alarm region within the predefined distance was established with tangent and normal lines extracted from control points. The image-based virtual fence can be used for remote detection of intrusion and provision of real-time intrusion alarm, and can be expected to use in safety-related application areas including security and crime prevention.
A fixed-point implementation and performance analysis of EGML moving object detection algorithm
An, Hyo-sik ; Kim, Gyeong-hun ; Shin, Kyung-wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2153~2160
DOI : 10.6109/jkiice.2015.19.9.2153
An analysis of hardware design conditions of moving object detection (MOD) algorithm is described, which is based on effective Gaussian mixture learning (EGML). A simulation model of EGML algorithm is implemented using OpenCV, and the effects of some parameter values on background learning time and MOD sensitivity are analyzed for various images. In addition, optimal design conditions for hardware implementation of EGML-based MOD algorithm are extracted from fixed-point simulations for various bit-widths of parameters. The proposed fixed-point model of the EGML-based MOD uses only half of the bit-width at the expense of the loss of MOD performance within 0.5% when compared with floating-point MOD results.
Analysis of Straight Line Detection Using PCA
Oh, Jeong-su ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2161~2166
DOI : 10.6109/jkiice.2015.19.9.2161
This paper analyzes the straight line detection using the principal component analysis (PCA) and proposes its improved algorithm to which two new functions are added. The first function removes invalid pixels through the detected straight line and detects a line again. The second function detects lines from non-overlapped blocks, selects valid line candidates, and detects a valid line from pixels adjacent to each line candidate. The proposed algorithm detects a more accurate straight line with a low computation in comparison with the conventional algorithm in an image with somewhat refined lines.
A Study on Salt & Pepper Noise Removal using the Pixel Distribution of Local Mask
Kwon, Se-Ik ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2167~2172
DOI : 10.6109/jkiice.2015.19.9.2167
Due to the recent progress in information technology, demand for video imaging devices such as displays has grown. In general, images experience deterioration during the process of transmission due to various reasons. Many studies have boon undertaken on ways o reduce such noise. This paper6 suggests an algorithm that makes a judgment on the noise in order to remove the salt & pepper noise and replaces original pixels if they are non-noise while processing noise according to its density. The suggested algorithm shows a high PSNR of 30.49[dB] for Goldhill images that had been damaged of a high density salt & pepper noise(P = 60%), Compared to the exising CWMF, SWMF, and A-TMF, there were improvements by 17.74[dB], 11.52[dB], and 13.76[dB], respectively.
A Study on Removal of Salt and Pepper Noise using Deformable Masks Depending on the Noise Density
Hong, Sang-Woo ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2173~2179
DOI : 10.6109/jkiice.2015.19.9.2173
In digital era image processing has been utilized in a variety of media such as TV, camera and smart phone. Typically salt and pepper noise are generated by various causes during the analysis, identification, and processing of image data. Principal filters such as SMF, CWMF, and AMF have been used to remove these noise. But the existing filters fall short of edge preservation and noise elimination in high noise densities. Thus, a processing algorithm, on which the size of deformable mask varies depending on the noise density, is proposed to remove salt and pepper noise effectively in this study. The performance of the proposed method was evaluated compared with the existing methods using PSNR.
Plagiarism and Copyright Infringement Status and Countermeasures of Undergraduate Students in Smart Environments
Kim, Tae-Hee ; Kang, Moon-Seol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2180~2188
DOI : 10.6109/jkiice.2015.19.9.2180
Plagiarism in which people use other people's works partially or in entirety as if they are their own and infringement on copyrights that frequently occur in various forms under smart device environment are becoming one of the crucial problems that need to be solved for Korea to become an advanced nation. This paper investigates and analyzes how college students, the heaviest user of smart devices under various smart device environment, are committing plagiarism and copyright infringement and suggest a basic education plan to prevent plagiarism and copyright infringement. College students have a very low awareness of plagiarism and copyrights and the level of violation associated with plagiarism and copyrights infringement they commit from elementary school to college were found to be at a serious level. It was demonstrated that the solution suggested in this paper to solve these problems would be effective in enhancing the awareness of the bad effect of plagiarism and copyrights infringement along with their side effects.
Development of a PCS Simulator and Data Storage System for Energy Saving in the Ship
Oh, Jin-Seok ; Kang, Young-Min ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2189~2196
DOI : 10.6109/jkiice.2015.19.9.2189
According to increase environmental pollutions and fuel costs, The study of energy saving in the ship is proceeding actively. PCS is pump control system for cooling system in the ship to improve the energy efficiency by controling rotation speed of sea water pump, fresh water pump and position of 3way valve. In this paper, we develop the PCS simulator that has an environment similar to the cooling system of the actual vessel to ensure reliability of the PCS. Also, PC-based control and data storage system for PCS simulator is developed. To develop this system, National Instrument's cDAQ and LabVIEW are used. Finally, confirm the behavior of the simulator by analyzing the saving data.
Design of the Copyright Protection for ePub e-Book System using Certification Information
Jang, Seung-Ju ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2197~2204
DOI : 10.6109/jkiice.2015.19.9.2197
In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.
An Exploratory Study on Acceptance Factors of IPTV Healthcare Service using Delphi Method
Cho, Hyunju ; Kim, Mincheol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2205~2212
DOI : 10.6109/jkiice.2015.19.9.2205
The aim of this study was to explore the acceptance factors of IPTV healthcare users as convergence service through experts's opinion. First, this study extracted expected indicators for the acceptance factors from brainstorming and literature review. Based on the expected indicators, the Delphi method was performed in order to explore the suitable acceptance factors. The reliability of collected data was evaluated through the criteria of CV(Coefficient of Variation) and CVR(Contents Validity Ratio) on the selected indicators. The results showed a significant acceptance factors timeliness, the following appeared as entertainment, fun and self-efficacy and more. In the future, such additional step as factor analysis targeting the user to verify the validity of the selected factors is required.
Performance Evaluation of Job Scheduling Techniques Incorporating the Ondemand Governor Policy
Tak, Sungwoo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 19, issue 9, 2015, Pages 2213~2221
DOI : 10.6109/jkiice.2015.19.9.2213
The ondemand governor used in android-based smartphone platforms is a CPU frequency scaling technique. The ondemand governor sets the CPU operating frequency depending on the CPU utilization rate. Job scheduling affects the CPU utilization rate. The power consumption is proportional to the value of operating frequency. Consequently, CPU frequency scaling and CPU utilization rate have an effect on power consumption in a smartphone. In this paper, we evaluated the performance of job scheduling techniques incorporating the ondemand governor in terms of CPU utilization, power consumption, and job deadline miss ratio.