Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
IEMEK Journal of Embedded Systems and Applications
Journal Basic Information
Journal DOI :
Institute of Embedded Engineering of Korea
Editor in Chief :
Volume & Issues
Volume 5, Issue 4 - Dec 2010
Volume 5, Issue 3 - Sep 2010
Volume 5, Issue 2 - Jun 2010
Volume 5, Issue 1 - Mar 2010
Selecting the target year
Image Identifier Based on Linear Component Extraction using Hough Transform
Park, Je-Ho ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 111~117
The easily accessible handheld devices equipped with camera are widely available as common commodities. According to this trend, utilization of images is popular among common users for various purposes resulting in huge amount of images in local or network based storage systems. In this environment, identification of an image with a solid and effective manner is demanded in behalf of safe distribution and efficient management of images. The generated identifiers can be used as a file name in file systems or an index in image databases utilizing the uniqueness of the identifiers. In this paper, we propose a method that generates image identifiers using linear components in images. Some experiments of generation of identifiers are performed, and the results evaluate that the proposed method has feasible effectiveness.
An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station
Cho, KookRae ; Son, Jong-Wuk ; Cho, HuiSup ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 118~127
Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.
Multiple Register Files for Fast Context Switching in Real-Time Systems
Kim, Jong-Wung ; Cho, Jeoung-Hun ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 128~135
Recently complexity of embedded software cause to be used real-time operating system (RTOS) to implement various functions in the embedded system. And also, according to requirement of complex functions in embedded systems, the number as well as complexity of tasks get increased continuously. In case that many tasks collaborated in a microprocessor, context switching time between tasks is a overhead waisting a CPU resource. Therefore the time of task context switching is an important factor that affects performance of RTOS. In this paper, we concentrate on the improvement of task context switch for reducing overhead and achieving fast response time in RTOS. To achieve these goal, we suggest multiple register files and task context switching algorithm. By reducing the context switch overhead, we try to ease scheduling and assure fast response times in multitasking environment. As a result, the context switch overhead decreased by 8~16% depend on the number of register files, and some task set which are not schedulable with single register file are schedulable due to that decrease with multiple register files.
Calculating Emission Power Limits of Electromagnetic Disturbance Signal for Embedded Systems in ISM Bands
Cho, Myeon-Gyun ; Kim, Shik ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 136~143
Embedded systems widely used for wireless communication such as W-LAN, Bluetooth and ZigBee operate on ISM (Industrial, Scientific and Medical) band but they can be seriously affected by electromagnetic interference radiated from ISM apparatus. Therefore C.I.S.P.R. reports proposed limits for the protection of telecommunication from interference from ISM equipment. In this paper, we clarify the methods for calculating limits for disturbance signal for Embedded Systems in ISM band and propose simple way of calculating limits for interference signal in both above and below 1 GHz band cases.
The Classification of Ubiquitous Service Model
Lee, Chang-Mug ; Kwon, Oh-Young ; Son, Young-Sung ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 144~151
Ubiquitous computing which is providing various convenient services to user will prevail in future. To realize ubiquitous service, analyzing technical and information factors for service implementation is necessary. This paper defines ubiquitous service model to satisfy user demands and we analyze technical and information factors in order to realize services. Based on the factors, we extracts and classifies common compositions of ubiquitous services to suggest guidelines of service design.
Threshold Setting for LOS/NLOS Identification Based on Joint TOA and RSS
Guan, XuFeng ; Hur, SooJung ; Park, Yongwan ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 152~156
Non-line-of-sight (NLOS) propagation is one of the challenges in radio positioning. Distinguishing the transmission status of the communication as line-of-sight (LOS) or NLOS is of great importance for the wireless communication systems. This paper focuses on the identification of NLOS based on time-of-arrival (TOA) distance estimates and the received signal strength (RSS) measurements. We set a path loss threshold based on the joint TOA and RSS based NLOS detection method to determine LOS or NLOS. Simulation results show that the proposed method ensures the correct of detection for the LOS condition and can improve the NLOS identification for the weak noise and long distance.
Multi-Path DSDV Routing Protocol using Bypass Information in Wireless Mesh Network
Lee, Do-Yup ; Kim, Jung-Gyu ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 157~167
One of the most famous proactive routing protocols, DSDV (Destination -Sequenced Distance-Vector), is based on the minimum hop count. This paper suggests BIMP(Bypass Information Multi-Path) DSDV routing protocol that this protocol could route reliably as it can take the information of the bypass for the solution of the problem on EHMP DSDV. In this paper, the protocol checks throughput, packet delivery delay, packet delivery ratio, number of management messages, packet transmit finish time, etc on the traffic compared to DSDV, HMP DSDV, and EHMP DSDV protocols.
Smart Card Certification-Authority Distribution Scheme using Attributes-Based Re-Encryption
Seo, Hwa-Jeong ; Kim, Ho-Won ;
IEMEK Journal of Embedded Systems and Applications, volume 5, issue 3, 2010, Pages 168~174
User authentication is an important requirement to provide secure network service. Therefore, many authentication schemes have been proposed to provide secure authentication, such as key agreement and anonymity. However, authority of scheme is limited to one's self. It is inefficient when authenticated users grant a certification to other users who are in an organization which has a hierarchical structure, such as a company or school. In this paper, we propose the first authentication scheme to use Attributes-Based Re-encryption that creates a certification to other users with specified attributes. The scheme, which has expanded from Rhee et al. scheme, has optimized computation performance on a smart card, ensuring the user's anonymity and key agreement between users and server.