Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 20, Issue 8 - Aug 2016
Volume 20, Issue 7 - Jul 2016
Volume 20, Issue 6 - Jun 2016
Volume 20, Issue 5 - May 2016
Volume 20, Issue 4 - Apr 2016
Volume 20, Issue 3 - Mar 2016
Volume 20, Issue 2 - Feb 2016
Volume 20, Issue 1 - Jan 2016
Selecting the target year
Compact Dual-band Slot Antenna With Bent Slots
Baek, Woon-Seok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1049~1056
DOI : 10.6109/jkiice.2016.20.6.1049
In this paper, a design method for a compact dual-band slot antenna with bent slot is studied. Bent slots are added on the rectangular slot of the proposed antenna for dual-band operation. The rectangular slot is fed by a coaxial cable by placing a rectangular feeding patch inside the slot. When the bent slots are added onto the both corner of the upper side of the rectangular slot symmetrically, a new resonant frequency is created in low frequency because of the increasement of the slot length. A prototype of the proposed dual-band slot antenna operating at 2.45 GHz WLAN band and 4.50-8.30 GHz band including 5GHz WLAN band is fabricated on an FR4 substrate with a dimension of 30 mm by 30 mm. Experiment results show that the antenna has a desired impedance characteristic with a frequency band of 2.40-2.49 GHz and 4.33-9.85 GHz for an input reflection coefficient < -10 dB.
Miniaturized Design of Log-Periodic Dipole Array Antenna Using Half-Bowtie Dipole Elements
Yeo, Junho ; Lee, Jong-Ig ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1057~1062
DOI : 10.6109/jkiice.2016.20.6.1057
In this paper, a design method for a compact log-perio dic half-bow-tie dipole array antenna for an operation in a UWB band(3.1-10.6 GHz) is studied. The proposed antenna is miniaturized by using half-bow-tie shaped dipole elements instead of strip-type dipole elements, which are commonly used in a general log-periodic dipole array(LPDA) antenna, and by reducing the element spacing. The effects of the flare angle of the half-bow-tie elements and the spacing factor on input reflection coefficient and realized gain characteristics of the proposed log-periodic antenna are analyzed. The optimized antenna is fabricated on an FR4 substrate, and the experiment results show that the antenna has a frequency band of 2.95-11.31 GHz for a VSWR < 2, which assures the operation in the UWB band. In addition, the length and width of the proposed antenna are reduced to 32.1 % and 18.3 %, respectively, compared to the LPDA antenna.
Naive Bayes Classifier based Anomalous Propagation Echo Identification using Class Imbalanced Data
Lee, Hansoo ; Kim, Sungshin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1063~1068
DOI : 10.6109/jkiice.2016.20.6.1063
Anomalous propagation echo is a kind of abnormal radar signal occurred by irregularly refracted radar beam caused by temperature or humidity. The echo frequently appears in ground-based weather radar due to its observation principle and disturb weather forecasting process. In order to improve accuracy of weather forecasting, it is important to analyze radar data precisely. Therefore, there are several ongoing researches about identifying the anomalous propagation echo with data mining techniques. This paper conducts researches about implementation of classification method which can separate the anomalous propagation echo in the raw radar data using naive Bayes classifier with various kinds of observation results. Considering that collected data has a class imbalanced problem, this paper includes SMOTE method. It is confirmed that the fine classification results are derived by the suggested classifier with balanced dataset using actual appearance cases of the echo.
A Framework for Time Awareness System in the Internet of Things
Hwang, Soyoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1069~1073
DOI : 10.6109/jkiice.2016.20.6.1069
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications and covers a variety of protocols, domains, and applications. Key system-level features that IoT needs to support can be summarized as device heterogeneity, scalability, ubiquitous data exchange through proximity wireless technologies, energy optimized solutions, localization and tracking capabilities, self-organization capabilities, semantic interoperability and data management, embedded security and privacy-preserving mechanisms. Time information is a critical piece of infrastructure for any distributed system. Time information and time synchronization are also fundamental building blocks in the IoT. The IoT requires new paradigms for combining time and data. This paper reviews conventional time keeping mechanisms in the Internet and presents issues to be considered for combining time and data in the IoT.
A Meta-Analysis of Influencing Soybean Food Interventions on the Metabolic Syndrome Risk Factors Utilizing Big Data
Jin, Chan-Yong ; Yu, Ok-Kyeong ; Nam, Soo-Tai ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1074~1080
DOI : 10.6109/jkiice.2016.20.6.1074
Big data analysis refers the ability to store, manage and analyze collected data from an existing database management tool. Thus, meta-analysis is a statistical integration method that delivers an opportunity to overview the entire result of integrating and analyzing many quantitative research results. Commonly, factors of metabolic syndrome can be defined as abdominal obesity, systolic blood pressure, diastolic blood pressure, triglycerides, and high density lipoprotein cholesterol. In this meta-analysis, we concluded that the path between pre and post of the fasting blood glucose had the largest effect size of (r
Instructor`s Smart Learning Acceptance : Focusing on TAM Model
Kim, Do-Goan ; Lee, Hyun-Chang ; Rhee, Yang-Won ; Shin, Seong-Yoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1081~1086
DOI : 10.6109/jkiice.2016.20.6.1081
While smart learning have been introduced for more learning effect, this study is to understand instructor`s smart learning acceptance using technology acceptance model(TAM). This study developed the extended TAM model, including external pressure for smart learning and smart self efficacy for smart devices as study variables and attempted to examine the research model through the empirical analysis. The research model has the 7 variables including smart self-efficacy and external pressure. For the empirical study, the survey was conducted for the one month, March, 2016, and the total 143 data among the collected 167 responses were used for the empirical analysis. As the result of the analysis through the structural equation model, the 9 paths among the total 10 paths show the significant relationships between the variables. Through using the result of this study, it is to provide suggestions for the improvement of smart learning environments.
The Box-office Success Factors of Films Utilizing Big Data-Focus on Laugh and Tear of Film Factors
Hwang, Young-mee ; Park, Jin-tae ; Moon, Il-young ; Kim, Kwang-sun ; Kwon, Oh-young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1087~1095
DOI : 10.6109/jkiice.2016.20.6.1087
The study aims to analyze factors of box office utilizing big data. The film industry has been increasing in the scale, but the discussion on analysis and prediction of box-office hit has not secured reliability because of failing in including all relevant data. 13 films have sold 10 million tickets until the present in Korea. The study demonstrated laughs and tears as an main interior factors of box-office hit films which showed more than 10 milling tickets power. First, the study collected terms relevant to laugh and tear. Next, it schematizes how frequently laugh and tear factors could be found along the 5-film-stage (exposition - Rising action - crisis - climax - ending) and revealed box-office hit films by genre. The results of the analysis would contribute to the construction of comprehensive database for the box office predictions on future scenarios.
The Impact Perceived Risk on User`s Trust and Continuance Intention in Mobile Payment Systems
Choi, Hun ; Choi, Yoo-jung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1096~1102
DOI : 10.6109/jkiice.2016.20.6.1096
Various services have been provided due to the recent development of IT technology and widespread usage of smartphones. In recent years, Fintech service that provides financial services through mobile devices has been the trending issue. However, mobile payment services haven`t been widely used. The risk factors that appear when users seek to utilize a service, in particular, is one of the biggest hinderance in the expansion of mobile payment services. The failure of gaining the trust of the consumers appear to be the continuing hinderance factor. Therefore this study is to analyse the impact of perceived risk factors on trust and continuance intention of mobile payment services. For the research purpose, we conducted survey and the research results show that most of perceived risk factors have influence on trust and continuance intention except on the impact of perceived financial risk on trust.
A MEMS-Based Finger Wearable Computer Input Devices
Kim, Chang-su ; Jung, Se-hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1103~1108
DOI : 10.6109/jkiice.2016.20.6.1103
The development of a variety of sensor technology, users smart phone, the use of motion recognition apparatus such as a console game machines is increasing. It tends to user needs motion recognition-based input device are increasing. Existing motion recognition mouse is equipped with a modified form of the mouse button on the outside and serves as a wheel mouse left and right buttons. Existing motion recognition mouse is to manufacture a small, there is a difficulty to operate the button. It is to apply the motion recognition technology the motion recognition technology is used only pointing the cursor there is a limit. In this paper, use of MEMS-based motion recognition sensor, the body of the two-point operation data by recognizing the operation of the (thumb and forefinger) and generating a control signal, followed by studies on the generated control signal to a wireless transmitting computer input device.
Certificateless Public Key Encryption Revisited: Security Model and Construction
Kim, Songyi ; Park, Seunghwan ; Lee, Kwangsu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1109~1122
DOI : 10.6109/jkiice.2016.20.6.1109
Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user`s ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.
Ontology-based Positioning Systems for Indoor LBS
Hwang, Chi-Gon ; Yoon, Chang-Pyo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1123~1128
DOI : 10.6109/jkiice.2016.20.6.1123
Recently BLE beacon has been widely used as a method for measuring the indoor location in the IoT Technique. But it requires a filtering technique for the measurement of the correct position. It is used the most fixed beacon. It is not accurate that calculates the position information through the identification of the beacon signal. Therefore, filtering is important. So it takes a lot of time, position measurement and filtering. Thus, we is to measure the exact position at the indoor using a mobile beacon. The measured beacon signal is composed of an ontology for reuse in the same pattern. RSSI is measured the receiver is the distance of the beacon. And this value configure the location ontology to be normalized by the relationship analysis between the values. The ontology is a method for calculating the position information of the moving beacon. It can detect fast and accurate indoor position information and provide the service.
The Analysis of the APT Prelude by Big Data Analytics
Choi, Chan-young ; Park, Dea-woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1129~1135
DOI : 10.6109/jkiice.2016.20.6.1129
The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on december in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attacks(Advanced Persistent Threat Attacks) thus far. We will use big data analytics to analyze whether or not APT attacks has occurred. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean Defense System. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attacks. Lastly, we will present an effective response method to address a detected APT attacks.
Transmission Control Method of Beacon Signal Based on Bluetooth of Lower Electric Power
Oh, Am-suk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1136~1141
DOI : 10.6109/jkiice.2016.20.6.1136
IoT technology has been used as a core technology of convergence service that needs intelligent information processing, and the importance is largely emerging now. And internal network construction thru IoT interaction device can connect with IoT device effectively, provide diverse services by connection with open platform. Especially, beacon that is based on low electric power bluetooth device is receiving attention as one of core technology of IoT. Beacon technology is utilized widly in various fields of industry, and there are lot of demands in the specific environment and conditions beyond the basic function. On this thesis, the authors are proposing the beacon device that utilized acceleration sensor and hole sensor. this beacon device can control the target on specific situation thru sensing of moving target. For the more, we will expect to apply to the various type of factory environments like detachable installation, optimized management using sensor.
Development of Equipment Control System based on DB Access Method for Industrial IoT
Cho, Kyoung-woo ; Jeon, Min-ho ; Oh, Chang-heon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1142~1147
DOI : 10.6109/jkiice.2016.20.6.1142
Recently, IoT(Internet of Things) has been extensively researching to provide intelligent services by fusing ICT. Especially with the advent of Germany`s Industry 4.0, it is emphasized the importance of the industrial IoT to maximize the production capacity. Accordingly, a lot of efforts to spread the smart factory base of industrial IoT have continued domestically as well as abroad. But the current smart factory systems have controlled equipment using the data declared in the embedded systems. Therefore, it is difficult to control environment that lots of equipment is installed. In this paper, we proposed equipment control system based on data base access method for industrial IoT. This method controls the equipment using data base from parameter of equipment. Through experiments that the system apply to mold shot system with a number of variables, it is shown that the proposed method can efficiently control a number of devices.
Design and Implementation of Smart LED Bicycle Helmet using Arduino
Ahn, Sung-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1148~1153
DOI : 10.6109/jkiice.2016.20.6.1148
The number of cyclists is on the steady growing for leisure and transportation with the increasing interest in health and environment. However, the number of cycling accidents is also increasing steadily due to the lack of safety awareness and regulations. Focusing on this issue, we propose and develop a smart LED bicycle helmet in order to reduce a risk of cycling accident. The main idea is to change status of the LED on the helmet based on the bicycle`s movement and provide motion information of the bicycle for others. To control the LED lights on the helmet, we use the Arduino board which communicates with the LED module through serial connection. We decide motion information by using the values from acceleration and GPS sensors of the smartphone. To receive this information from the smartphone, the control board and the smartphone are connected by Bluetooth.
Fast-Transient Digital LDO Regulator With Binary-Weighted Current Control
Woo, Ki-Chan ; Sim, Jae-Hyeon ; Kim, Tae-Woo ; Hwang, Seon-Kwang ; Yang, Byung-Do ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1154~1162
DOI : 10.6109/jkiice.2016.20.6.1154
This paper proposes a fast-transient digital LDO(Low dropout) regulator with binary-weighted current control technique. Conventional digital LDO takes a long time to stabilize the output voltage, because it controls the amount of current step by step, thus ringing problem is generated. Binary-weighted current control technique rapidly stabilizes output voltage by removing the ringing problem. When output voltage reliably reaches the target voltage, It added the FRZ mode(Freeze) to stop the operation of digital LDO. The proposed fast response digital LDO is used with a slow response DC-DC converter in the system which rapidly changes output voltage. The proposed digital controller circuit area was reduced by 56% compared to conventional bidirectional shift register, and the ripple voltage was reduced by 87%. A chip was implemented with a
CMOS process. The settling time is
and the voltage ripple is 6.2mV when
output capacitor is used.
A Design of PRESENT Crypto-Processor Supporting ECB/CBC/OFB/CTR Modes of Operation and Key Lengths of 80/128-bit
Kim, Ki-Bbeum ; Cho, Wook-Lae ; Shin, Kyung-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1163~1170
DOI : 10.6109/jkiice.2016.20.6.1163
A hardware implementation of ultra-lightweight block cipher algorithm PRESENT which was specified as a standard for lightweight cryptography ISO/IEC 29192-2 is described. The PRESENT crypto-processor supports two key lengths of 80 and 128 bits, as well as four modes of operation including ECB, CBC, OFB, and CTR. The PRESENT crypto-processor has on-the-fly key scheduler with master key register, and it can process consecutive blocks of plaintext/ciphertext without reloading master key. In order to achieve a lightweight implementation, the key scheduler was optimized to share circuits for key lengths of 80 bits and 128 bits. The round block was designed with a data-path of 64 bits, so that one round transformation for encryption/decryption is processed in a clock cycle. The PRESENT crypto-processor was verified using Virtex5 FPGA device. The crypto-processor that was synthesized using a
CMOS cell library has 8,100 gate equivalents(GE), and the estimated throughput is about 908 Mbps with a maximum operating clock frequency of 454 MHz.
Implementation of VANET Simulator using Matlab
Nam, Jae-hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1171~1176
DOI : 10.6109/jkiice.2016.20.6.1171
VANET are a special kind of MANET adapted to the communications between vehicles. In this work, we propose the models used for representing the communication among vehicles, vehicles mobility features, and VANET simulator using realistic vehicular mobility models. VANET requires that a traffic and network simulator should be used together to perform this test. But, simulator tool has been preferred over traffic simulation because it simple, easy and cheap. Goal of this paper is to create a simulation of Vehicular Ad-Hoc network for urban scenario which can be used for testing purposes. Such environment can be used while designing better MAC protocols in VANETs. We are evaluating the performance of two routing protocols namely AODV and DSDV. The comparison was based on the throughout, packet loss and end-to-end delay. We found that DSDV has less throughput performance and high routing overhead than AODV. On average end-to-end delay and packet loss, AODV performs better than DSDV.
The Development of Industrial Communication Monitoring Board using AVR
Eum, Sang-hee ; Lee, Byong-Hoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1177~1182
DOI : 10.6109/jkiice.2016.20.6.1177
The most industrial instruments for monitoring and control are occurring the extension problem and the external protocol compatibility. In this paper, we developed the boards for the industrial communication monitoring that are able to convert the protocol in various communication between devices and instruments. These are consisted the main board and several sub-board. They can have extension using the main board connection. The sub-board support the each communication method or data transfer. The main board was used the Atmega 2560 Microprocessor of AVR series, and the sub-boards are have the Atmega 256 or Atmega 128 in the AVR series. We have designed to connect the sub-board using placed the 4 RS485 serial slots in the main board. The sub-boards were developed to support the analog and digital I/O. These are able to have monitoring by CAN and Ethernet communication. The experimental results, we obtained good data transfer rate and conversion rate.
Online Monitoring System based notifications on Mobile devices with Kinect V2
Niyonsaba, Eric ; Jang, Jong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1183~1188
DOI : 10.6109/jkiice.2016.20.6.1183
Kinect sensor version 2 is a kind of camera released by Microsoft as a computer vision and a natural user interface for game consoles like Xbox one. It allows acquiring color images, depth images, audio input and skeletal data with a high frame rate. In this paper, using depth image, we present a surveillance system of a certain area within Kinect`s field of view. With computer vision library(Emgu CV), if an object is detected in the target area, it is tracked and kinect camera takes RGB image to send it in database server. Therefore, a mobile application on android platform was developed in order to notify the user that Kinect has sensed strange motion in the target region and display the RGB image of the scene. User gets the notification in real-time to react in the best way in the case of valuable things in monitored area or other cases related to a reserved zone.
Web-based Obesity Prevention and Management System Using a Body Variation
He, Yi-Lun ; Kang, Hee-beom ; Jung, Hoe-kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1189~1194
DOI : 10.6109/jkiice.2016.20.6.1189
While increasing the convenience of life is a high population BMI (Body Mass Index) is increasing rapidly. Accordingly, the development of the monitoring system to manage and prevent obesity is the time that is required. But most of the monitoring system, the less information it receives management and show to have only simple information calculated this was a low efficiency problem. Also Users with normal and disease Management accuracy is low. In this paper shows the user in a graph of Body Mass Index, BMR (Basal metabolic rate) divided by grade increased accuracy for users to manage their own. Also represented by recovery with exercise machines you used, select a balanced movement mechanism, expressed as a Kcal consumption. If the graph recent data show only increased the visibility. We developed an efficient web-based monitoring system for design a exercise plan.
A Development of Analysis System for Vessel Traffic Display and Statistics based on Maritime-BigData
Hwang, Hun-Gyu ; Kim, Bae-Sung ; Shin, Il-Sik ; Song, Sang-Kee ; Nam, Gyeung-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1195~1202
DOI : 10.6109/jkiice.2016.20.6.1195
Recently, a lot of studies that applying the big data technology to various fields, are progressing actively. In the maritime domain, the big data is the meaningful information which makes and gathers by the navigation and communication equipment from the many ships on the ocean. Also, importance of the maritime safety is emphasized, because maritime accidents are rising with increasing of maritime traffic. To support prevention of maritime accidents, in this paper, we developed a vessel traffic display and statistic system based on AIS messages from the many vessels of maritime. Also, to verify the developed system, we conducted tests for vessel track display function and vessel traffic statistic function based on two test scenarios. Therefore, we verified the effectiveness of the developed system for vessel tracks display, abnormal navigation patterns, checking failure of AIS equipments and maritime traffic statistic analyses.
Reading Children`s Mind from Digital Drawings based on Dominant Color Analysis using ART2 Clustering and Fuzzy Logic
Kim, Kwang-baek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1203~1208
DOI : 10.6109/jkiice.2016.20.6.1203
For young children who are not spontaneous or not accurate in verbal communication of their emotions and experiences, drawing is a good means of expressing their status in mind and thus drawing analysis with chromatics is a traditional tool for art therapy. Recently, children enjoy digital drawing via painting tools thus there is a growing needs to develop an automatic digital drawing analysis tool based on chromatics and art therapy theory. In this paper, we propose such an analyzing tool based on dominant color analysis. Technically, we use ART2 clustering and fuzzy logic to understand the fuzziness of subjects` status of mind expressed in their digital drawings. The frequency of color usage is fuzzified with respect to the membership functions. After applying fuzzy logic to this fuzzified central vector, we determine the dominant color and supporting colors from the digital drawings and children`s status of mind is then analyzed according to the color-personality relationships based on Alschuler and Hattwick`s historical researches.
Study on Performance Evaluation of Automatic license plate recognition program using Emgu CV
Kim, Nam-Woo ; Hur, Chang-Wu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1209~1214
DOI : 10.6109/jkiice.2016.20.6.1209
LPR(License plate recognition) is a kind of the most popular surveillance technology based on accompanied by a video and video within the optical character recognition. LPR need a many process. One is a localization of car license plates, license plate of size, space, contrast, normalized to adjust the brightness, another is character division for recognize the character optical character recognition to win the individual characters, character recognition, the other is phrase analysis of the shape, size, position by year, the procedure for the analysis by comparing the database of license plate having a difference by region. In this paper, describing the results of performance of license plate recognition S/W, which was implemented using EmguCV, find the location, using the tesseract OCR, which are well known to an optical character recognition engine of open source, the characters of the license plate image capturing angle of the plate, image size, brightness.
Noise Removal using Modified Switching Filter in Mixed Noise Environments
Kwon, Se-Ik ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 20, issue 6, 2016, Pages 1215~1220
DOI : 10.6109/jkiice.2016.20.6.1215
As society has developed rapidly toward a highly advanced digital information age, a multimedia communication service for acquisition, transmission and storage of image data as well as voice has being commercialized. However, image data is always corrupted by various noises during image processing, so researches for removing noises have been continued until now. There are diverse types of noise on the image including salt and pepper noise, AWGN, and mixed noise. Hence, the filter algorithm for the image recovery was proposed that salt and pepper noise was processed by linear interpolation, histogram weighted values and median filter after defining the noise to lessen the impact of mixed noise added in the image, and AWGN was processed by the pixel information of local mask establishing the weighted values in this study. In addition, the algorithm was compared with the conventional methods for objectively and used the PSNR(peak signal to noise ratio) as the basis of the determination.