Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korea Institute of Information, Electronics, and Communication Technology
Journal Basic Information
Journal DOI :
The Korea Institute of Information & Electronic Communication Technology
Editor in Chief :
Volume & Issues
Volume 8, Issue 6 - Dec 2015
Volume 8, Issue 5 - Oct 2015
Volume 8, Issue 4 - Aug 2015
Volume 8, Issue 3 - Jun 2015
Volume 8, Issue 2 - Apr 2015
Volume 8, Issue 1 - Feb 2015
Selecting the target year
The Cost Analysis of Network by The Function of Automatic Link Recovery
Song, Myeong-Kyu ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 439~444
DOI : 10.17661/jkiiect.2015.8.6.439
The Social infrastructure systems such as communication, transportation, power and water supply systems are now facing various types of threats including component failures, security attacks and natural disasters, etc. Whenever such undesirable events occur, it is crucial to recover the system as quickly as possible because the downtime of social infrastructure causes catastrophic consequences in the society. Especially when there is a network link-failure, we need an automatic link-recovery method. This means that customers are aware of network failures that can be recovered before you say that service. In this paper, we analysis the relation between Auto-recovery performance and cost.
The Comparative Study of NHPP Software Reliability Model Based on Log and Exponential Power Intensity Function
Yang, Tae-Jin ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 445~452
DOI : 10.17661/jkiiect.2015.8.6.445
Software reliability in the software development process is an important issue. Software process improvement helps in finishing with reliable software product. Infinite failure NHPP software reliability models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. In this paper, proposes the reliability model with log and power intensity function (log linear, log power and exponential power), which made out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on mean square error (MSE) and coefficient of determination(
), for the sake of efficient model, was employed. Analysis of failure, using real data set for the sake of proposing log and power intensity function, was employed. This analysis of failure data compared with log and power intensity function. In order to insurance for the reliability of data, Laplace trend test was employed. In this study, the log type model is also efficient in terms of reliability because it (the coefficient of determination is 70% or more) in the field of the conventional model can be used as an alternative could be confirmed. From this paper, software developers have to consider the growth model by prior knowledge of the software to identify failure modes which can be able to help.
Digit Recognition for Vehicle License Plate Based on Opened Enclosure
Zheng, Liu ; Kim, Dong-Wook ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 453~459
DOI : 10.17661/jkiiect.2015.8.6.453
In this paper, we propose a new digit recognition method based on opened enclosure. In the proposed method, each digit is divided into two parts, an upper part and a lower part, which are based on a cutting line that is modified depending on the number of intersection points. In the simulation, the performance evaluation through the data acquisition and application of the proposed algorithm was carried out and the result was presented.
Manchester coding of compressed binary clusters for reducing IoT healthcare device's digital data transfer time
Kim, Jung-Hoon ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 460~469
DOI : 10.17661/jkiiect.2015.8.6.460
This study's aim is for reducing big data transfer time of IoT healthcare devices by modulating digital bits into Manchester code including zero-voltage idle as information for secondary compressed binary cluster's compartment after two step compression of compressing binary data into primary and secondary binary compressed clusters for each binary clusters having compression benefit of 1 bit or 2 bits. Also this study proposed that as department information of compressed binary clusters, inserting idle signal into Manchester code will have benefit of reducing transfer time in case of compressing binary cluster into secondary compressed binary cluster by 2 bits, because in spite of cost of 1 clock idle, another 1 bit benefit can play a role of reducing 1 clock transfer time. Idle signal is also never consecutive because the signal is for compartment information between two adjacent secondary compressed binary cluster. Voltage transition on basic rule of Manchester code is remaining while inserting idle signal, so DC balance can be guaranteed. This study's simulation result said that even compressed binary data by another compression algorithms could be transferred faster by as much as about 12.6 percents if using this method.
A Heuristic Technique for Generating the Synchronizable and Optimized Conformance Test Sequences
Kim, Chul ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 470~477
DOI : 10.17661/jkiiect.2015.8.6.470
This paper presents a new technique for generating an optimum synchronizable test sequence that can be applied in the distributed test architecture where both external synchronization and input/output operation costs are taken into consideration. The method defines a set of phases that constructs a tester-related digraph from a given finite state machine representation of a protocol specification such that a minimum cost tour of the digraph with intrinsically synchronizable transfer sequences can be used to generate an optimum synchronizable test sequence using synchronizable state identification sequences as the state recognition sequence for each state of the given finite state machine. This hybrid approach with a heuristic and optimization technique provides a simple and elegant solution to the synchronization problem that arises during the application of a predetermined test sequence in some protocol test architectures that utilize remote testers.
Find Maze Functional Devices using Wireless Communication
Kim, Ho-Joon ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 478~482
DOI : 10.17661/jkiiect.2015.8.6.478
With the analysis result about previous curative effect researchs, It has been reported that game play therapy is effective for enhancing social intelligence of handicappted children who have ADHD, tic disorder, communication disorder, or autism. This study was designed to develop a digilog game play therapy contents that was combined analog and digital. We infer that this contents is effective game play therapy not only for ordinary people but also for dementia old man, or intellectual disorder man. Also We are going to develop a new digilog play game system for preventing children's smartphone addiction.
The Assessing Comparative Study for Statistical Process Control of Software Reliability Model Based on Musa-Okumo and Power-law Type
Kim, Hee-Cheul ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 483~490
DOI : 10.17661/jkiiect.2015.8.6.483
There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do likelihood inference for software reliability models based on finite failure model and non-homogeneous Poisson Processes (NHPP). For someone making a decision about when to market software, the conditional failure rate is an important variables. The infinite failure model are used in a wide variety of practical situations. Their use in characterization problems, detection of outlier, linear estimation, study of system reliability, life-testing, survival analysis, data compression and many other fields can be seen from the many study. Statistical process control (SPC) can monitor the forecasting of software failure and thereby contribute significantly to the improvement of software reliability. Control charts are widely used for software process control in the software industry. In this paper, proposed a control mechanism based on NHPP using mean value function of Musa-Okumo and Power law type property.
Study on Face recognition algorithm using the eye detection
Park, Byung-Joon ; Kim, Ki-young ; Kim, Sun-jib ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 491~496
DOI : 10.17661/jkiiect.2015.8.6.491
Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, the secure user authentication is required when the user is using cloud computing. This paper, we propose the enhanced AdaBoost algorithm for access cloud security zone. The AdaBoost algorithm despite the disadvantage of not detect a face inclined at least 20, is widely used because of speed and responsibility. In the experimental results confirm that a face inclined at least 20 degrees tilted face was recognized. Using the FEI Face Database that can be used in research to obtain a result of 98% success rate of the algorithm perform. The 2% failed rate is due to eye detection error which is the people wearing glasses in the picture.
A Study on the Impact of Job Characteristics on Empowerment
Bae, Seon-Sik ; Jeong, Jin-Gyeong ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 497~506
DOI : 10.17661/jkiiect.2015.8.6.497
The purpose of this study was to examine how to effectively further empowerment among organizational members based on empowerment theories. And it's also meant to investigate the influential relationship between job characteristics, which are the variables that organizational members should consider, and empowerment in an effort to provide more autonomy for the members of enterprises in Korean society. As a result of making the study, there were a significant positive influential relationship and significant correlation between job characteristics and empowerment. In the future, it seems necessary to make research to determine the process and way of furthering empowerment among organizational members and the characteristics of empowerment-boosting organizational culture, and more research should be implemented to apply the findings of these research efforts in various fields.
Technology of Sensors with Human Sensitivity
Song, Byung-Taeck ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 507~514
DOI : 10.17661/jkiiect.2015.8.6.507
The Internet of Things era is approaching where all the things are equipped with smart sensors and communicate through internet. The three core technologies of the Internet of Things are 'detection technology' to get information from things and the environment, 'wired and wireless communications and network infrastructure skills' that support to connect things to the internet, and 'service interface technology' that processes the information appropriate to various services. Smart sensor application can expand to smartphone, smart cars, smart home systems, wearable electronic devices, telemedicine systems, and environmental monitoring systems, etc. In particular, technologies that mimic the five human senses. This study reviews the biological principles of the human senses and the principles of operation, research & development status, technology trends and market analysis of the sensors.
A Novel Monopole Antenna for ISM 2.45GHz/5.8GHz Dual Band Characteristics by a Linear Monopole Antenna Combined with a Crossed Planar Monopole Antenna
Shim, Jae-Ruen ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 515~519
DOI : 10.17661/jkiiect.2015.8.6.515
In this paper, we suggested the novel monopole antenna for dual band characteristics by a linear monopole antenna combined with crossed planar monopole antenna. The target frequency is ISM(Industrial Scientific Medical) 2.45GHz/5.8GHz. The distinctive features of the proposed antenna in this paper is based on the slit in the surface of a crossed planar monopole for the dual band characteristics and the omnidirectional radiation patterns. The compact size of the proposed antenna is
. According to the simulation results, the bandwidth, the reflection coefficients below -10dB, of 2.45GHz and 5.8GHz are 150MHz and 1.43GHz, respectively. Consequently the proposed antenna structures is apply to the antenna for dual band characteristics.
Performance Analysis of Key Exchange Protocols on ETSI Standard
Lee, Young-Seok ; Choi, Hoon ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 520~527
DOI : 10.17661/jkiiect.2015.8.6.520
The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.
Design of USN Communication Protocol Using Individual Chaotic Systems
Yim, Geo-Su ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 528~533
DOI : 10.17661/jkiiect.2015.8.6.528
In the construction of USN environment, the implementation of a safe sensor network using wireless communications can be said to be the most important factor in the entire system. Although USN communication uses wireless communications to enhance accessability and non-contact capability, this results in the security vulnerability, thus endangering the system. In this regard, we propose a security protocol that can be effectively applied to USN, a multi-sensor network. The proposed protocol is a method using an individual chaotic system, and it is a security protocol to synchronize the main chaotic system mounted on each sensor and prepared key values into the initial values, and to communicate with the use of the synchronized values as symmetric keys. The communication protocol proposed in this paper is expected to yield good results as a new method to resolve security problems of USN and program capacity limitations of sensor nodes if subsequent studies continue to be carried out.
A Energy Theft Traceback Protocol in a Smart Grid Environment
Jeong, Eun-Hee ; Lee, Byung-Kwan ; Ahn, Hui-Hak ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 534~543
DOI : 10.17661/jkiiect.2015.8.6.534
This paper proposes an Energy Theft Traceback Protocol(ETTP) based on Logging and Marking that can trace Energy Theft back in Smart Grid Environment. The ETTP consists of the following three phases. First, it classifies Energy Theft Type into Measurement Rejection and Data Fabrication by generating an Energy Theft Tree. Second, it detects an Energy Theft by using the Energy Theft Tree. Finally, it trace an Energy Theft back by using the Logging Table of a Router and the Marking Information of a Packet. The result of its simulation shows that the Detection Ratio of Energy Theft is estimated at 92% and the Success Ratio of Energy Theft Traceback at 93%. Therefore, the ETTP not only reduces such risk factors as Forgery and Tampering about Billing information but also provides safe and reliable Smart Grid environment.
A Design of SNS Emotional Information Analysis Strategy based on Opinion Mining
Jeong, Eun-Hee ; Lee, Byung-Kwan ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 544~550
DOI : 10.17661/jkiiect.2015.8.6.544
The opinion mining technique which analogize significant information from SNS message is increasingly important because opinions communicated through SNS are increasing. This paper propose SEIAS(SNS Emotional Information Analysis Strategy) based on opinion mining that analogize emotional information from SNS setting a different weight according to position of antonym and adverb. Firstly, the proposed SEIAS constructs a emotion dictionary for opinion mining analysis, Secondly, it collects SNS data on real time, compare it with emotion dictionary and calculates opinion value of SNS data. Specially, it increases the precision of opinion analysis result compared to the existing SO-PMI because it sets up the different value according to the position of antonym and adverb when it calculates the opinion value of data.
Development of voice-enabled Gas timer using the S3F8S19 processor
Choi, Young-Gyu ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 551~555
DOI : 10.17661/jkiiect.2015.8.6.551
Dementia of the country due to the aging population of 59 thousand people has reached serious territory. To increase the number of future dementia doubled every 20 years until 2050, in 2020 about 84 thousand people, about 127 thousand people in 2030, 2050 are estimated at 271 thousand people. If you have a gas stove when using dementia patients at home, Voice Support breaker is required in a fire can automatically block the gas valve because of a risk. In this paper, we develop a gas-timer demented patients using S3F8S19 8bit processor to use the gas safely.
Software Design for Aerodynamics Simulation similar to actual Aircraft
Kim, Hyo-Kwan ; Choi, Young-Gyu ;
The Journal of Korea Institute of Information, Electronics, and Communication Technology, volume 8, issue 6, 2015, Pages 556~561
DOI : 10.17661/jkiiect.2015.8.6.556
The actual aircraft flight training can be done, throw this platform. this paper focuses on identifying the functions with respect to software components in the development of a aerodynamics system, which is based on the functions necessary to develop the real environment aircraft system. It also design activity diagram, concept as well as class diagram. This paper presents the main features and direction of aircraft to be equipped in the future gaming platforms. By designing a pilot platform updates that allow for new aircraft models students can understand exactly what they want and aircraft. this study presents a use case based on the aerodynamic simulation CSU concept to execution.