Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 10, Issue 6 - Dec 2010
Volume 10, Issue 5 - Oct 2010
Volume 10, Issue 4 - Aug 2010
Volume 10, Issue 3 - Jun 2010
Volume 10, Issue 2 - Apr 2010
Volume 10, Issue 1 - Feb 2010
Selecting the target year
Markov Chain Analysis of Opportunistic Cognitive Radio with Imperfect Sensing
Ahn, Hong-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 1~8
Wireless multimedia service through the access to mobile telephone network or data network is a vital part of contemporary life, and the demand for frequency spectrum for new services is expected to explode as the ubiquitous computing proliferate. Cognitive radio is a technology, which automatically recognizes and searches for temporally and spatially unused frequency spectrum, then actively determines the communication method, bandwidth, etc. according to the environment, thus utilizing the limited spectrum resources efficiently. In this paper, we investigate the effects of imperfect sensing, misdetection and false alarm, on the primary and secondary users' spectrum usage through the analysis of continuous time Markov Chain. We analyzed the effects of the parameters such as sensing error, offered load on the system performance.
Markov Chain Analysis of Opportunistic Cognitive Radio with Primary and Secondary User's Queue
Ahn, Hong-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 9~15
Cognitive radio is a technology, which automatically recognizes and searches for temporally and spatially unused frequency spectrum, then actively determines the communication method, bandwidth, etc. according to the environment, thus utilizing the limited spectrum resources efficiently. In this paper, with the imperfect sensing of misdetection and false alarm, we quantitatively investigate the effects of primary and secondary user's queue on the primary and secondary users' spectrum usage through the analysis of continuous time Markov Chain. With the queue primary user's spectrum usage improved up to 18%, and the secondary user's spectrum usage improved up to 50%.
Integral TS Demultiplexer of Memory Sharing based DVB-T/T-DMB Receiver
Kwon, Ki-Won ; Paik, Jong-Ho ; Kang, Min-Goo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 17~22
In this paper, integral TS(Transport Stream) demultiplexer of a multi-modal receiver is proposed according to the multiple standards of European terrestrial digital broadcasting DVB-T(Digital Video Broadcasting Terrestrial), and mobile terrestrial digital broadcasting T-DMB(Terrestrial Digital Multimedia Broadcasting). This USB based integral receiver could recover the multi-modal broadcasting audios by memory sharing technique which was utilized to decrease the load by the control of streaming multi-modal broadcasting. As a result of performance analysis for a proposed integral TS demultiplexer, the CPU occupational efficiency of windows based integral demulitiplexing is improved compared with DVB-T, and T-DMB respectively.
Robust Detection Technique for Abandoned Objects to Overcome Visual Occlusion
Kim, Won ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 23~29
Nowadays it is required to design intelligent visual surveillance systems which automatically detect abandoned objects in public places to strengthen the social safety. Already recognized abandoned objects can be occluded partially or fully by surrounding people in public places after the first recognition. To improve an essential recognition performance index PAT, the system should overcome the occlusion problems. In this research, a design scheme is newly proposed to construct the robust detection system which is comprised of multiple stages considering the occlusion problem. To show the feasibilities of the proposed system, the evaluation was tried for the prepared image streams including 6 various situations and the experimental results show 96% and 75% in PAT performance for intrusion and abandoning events, respectively. Finally in spite of full occlusions by multiple persons, the proposed system shows the capability to continuously recognize the abandoned object after complex occlusions disappear.
Performance of Decorrelator for Multirate Multicarrier DS/CDMA System
Lee, Seok-Hyun ; Lee, So-Young ; Kim, Jin-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 31~37
In this paper, a performance of a decorrelating detector for a multirate MC(multi-carrier) DS/CDMA system is analyzed and simulated in a frequency selective Rayleigh fading channel. The performance is compared with that of single rate MC-DS/CDMA system in term of bit error probability. Variable Spreading Length (VSL) is employed for MC-DS/CDMA system as multirate transmission scheme. From simulation result, it is shown that Decorrelator for multirate MC-DS/CDMA achieves high BER performance as well as that of single rate case.
Effects of Forwarders on TCP Performance in Network Coding for Wireless Mesh Networks
Lim, Chan-Sook ; Ahn, Hong-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 39~45
Most traffic in the real internet is TCP traffic. Therefore newly proposed network coding schemes must consider their effects on TCP performance. However, in most studies on network coding, performance evaluation has been conducted using other types of traffic than TCP traffic because network coding has effects on the pattern of packet transmission, which again can impact TCP performance. In most packet transmission schemes based on network coding for wireless mesh networks, it is determined which node, among the ones that received a broadcasted packet, should encode and forward it. In this paper, we examine how the forwarder nodes impact TCP performance.
Realtime Traffic Control of Traffic Networks using Analytic Hierachy Process
Jin, Hyun-Soo ; Hong, Yoo-Sik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 47~53
The paper presents a method for decision the optimal cycle time during the vehicle traffic control in single intersection with AHP. To solve this uncertainty optimization problem, the optimization index in the form of linear addition and fuzzy measurement is assumed and fuzzy integral is used. Examples of solution for two cases of optimal cycle time in two traffic controller are presented and compared.
An Analysis on the Deployment Methods for Smart Monitoring Systems
Heo, No-Jeong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 55~62
Monitoring systems are able to report certain events at region of interest(ROI) and to take an appropriate action. From industrial product line full of robots to fire detection, intrusion detection, smart grid application, environmental pollution alarm system, monitoring system has widely used in diverse industry sector. Recently, due to advance of wireless communication technology and availability of low cost sensors, intelligent and/or smart monitoring systems such as sensor networks has been developed. Several deployment methods are introduced to meet various monitoring needs and deployment performance criteria are also summarized to be used to identify weak point and be useful at designing monitoring systems. Both efficiency during deployment and usefulness after the deployment should be assessed. Efficiency factors during deployment are elapsed time, energy required, deployment cost, safety, sensor node failure rate, scalability. Usefulness factors after deployment are ROI coverage, connectivity, uniformity, target density similarity, energy consumption rate per unit time and so on.
Development of the IP-PBX with VPN function for voice security
Kim, Sam-Taek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 63~69
Today, Internet Telephony Services based on VoIP are gaining tremendous popularity for general user. Therefore a various demands of the user keep up increase, the most important requirements of these is voice security about telephony system. It is needed to ensure secret of voice call in a special situation. Due to the fact that many users can connect to the internet at the same time, VoIP can always be in a defenseless state by hackers. Therefore, in this paper, we have developed VPN IP-PBX for the voice security and measured conversation quality by adopting VPN IPsec based on SIP and using tunnel method in transmitting voice data to prevent eavesdrop of voice data. This VPN IP-PBX that is connected Soft-phone provide various optional services.
A Design and Fabrication of 120 GHz Local Oscillator
Lee, Won-Hui ; Chung, Tae-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 71~76
In this paper, a 120 GHz local oscillator(LO) for the sub-harmonic mixer in the THz transceiver with a carrier frequency of 240 GHz was designed and fabricated. A 120 GHz local oscillator was composed of 40 GHz PLL(Phase Locked Loop), 40 GHz BPF(Band Pass Filter), frequency tripler and 120 GHz BPF. The commercial model of the frequency tripler was used. The measured result of the 40 GHz PLL showed the phase noise of -105 dBc/Hz at the 100 kHz offset frequency. The measured result of 120 GHz BPF showed the insertion loss of 1.3 dB at center frequency of 119 GHz with bandwidth of 5 GHz. The output power of 120 GHz LO was measured to 6.6 dBm.
Implementation of Radio Access Network for Mobile Backhaul Network
Park, Chun-Kwan ; Song, Han-Young ; Jeon, Byung-Chun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 77~84
This paper aims to implement RAN(Radio Access Network) transmission system that can reduce the transmission cost by installing between mobile base station and base station controller. This system can reduce the number of transmission links by sharing the transmission link that the mobile communication stations of various generation use separately. This also can classify the traffics non-sensitive to delay time, and then transfer them through Ethernet/IP network.
Clustering-based Cooperative Routing using OFDM for Supporting Transmission Efficiency in Mobile Wireless Sensor Networks
Lee, Joo-Sang ; An, Beong-Ku ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 85~92
In this paper, we propose a Clustering-based Cooperative Routing using OFDM (CCRO) for supporting transmission efficiency in mobile wireless sensor networks. The main features and contributions of the proposed method are as follows. First, the clustering method which uses the location information of nodes as underlying infrastructure for supporting stable transmission services efficiently is used. Second, cluster-based cooperative data transmission method is used for improving data transmission and reliability services. Third, OFDM based data transmission method is used for improving data transmission ratio with channel efficiency. Fourth, we consider realistic approach in the view points of the mobile ad-hoc wireless sensor networks while conventional methods just consider fixed sensor network environments. The performance evaluation of the proposed method is performed via simulation using OPNET and theoretical analysis. The results of performance evaluation show improvement of transmission efficiency.
Android based Local SNS
Lee, Chung-Yeol ; An, Beong-Ku ; Ahn, Hong-Yeong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 93~98
Recently, users using social network service(SNS) with smart phone as well as users using smart phone are so rapidly increasing. In this paper, Android based local SNS system is proposed and developed. The main feature and contribution are as follows. First, the proposed SNS system is developed based on smart phone Android for supporting both the search of neighbor users and the addition of friends to start SNS with Web/DB. Second, the system is designed with the unchanged basic UI of Android and user oriented approach. The performance evaluation is performed by using OPTIMUS-Q/ANDROID 2.1. The results of performance evaluation show that the proposed SNS system can efficiently support the neighbor search services by using android based bluetooth neighbor search. Currently, we are still ongoing working on bluetooth autofaring in android to improve the performance of the proposed system.
Performance Analysis of an Opportunistic Cooperative Diversity System with Impulsive Noise in Rayleigh Fading
Kim, Nam-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 99~105
The most frequently used noise model for the performance analysis of a communication system is additive white Gaussian noise. However impulsive noise model is more practical for the real communication environments, currently the performance analysis of a communication system in impulsive noise is increasing. In this paper, therefore, the performance of a cooperative system, which is recently one of the most intensive research topics, is derived in impulsive noise. We analytically derive and compare the performance of two opportunistic cooperative diversity systems which have an amplify-and-forward (AF) relaying or a decode-and-forward (DF) relaying. It is noticed that the impulsive noise component is increases with decreasing the average number of impulses in impulsive noise, consequently the performance of two systems is degraded in high SNR region. Also it is shown that the performance of the opportunistic cooperative system with DF relaying is superior to that with AF relaying.
The Damage Classification by Periodicity Detection of Ultrasonic Wave Signal to Occur at the Tire
Oh, Young-Dal ; Kang, Dae-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 107~111
The damage of tire by damage material classification method is researched as used ultrasonic wave signal to occur at a tire during vehicle driving. Auto-correlation function after having passed through an envelope detecting preprocess is used for detecting periodicity because of occurring periodic ultrasonic waves signal with tire revolution. One revolution cycle time of a damaged tire and period that calculated auto-correlation function appeared equally in experiment. The result that can classification whether or not there was a tire damage is established.
A Study of the Vehicle Tire Damage Detection using Split Spectrum Processing
Jeon, Jae-Seok ; Kim, Ho-Yeon ; Kang, Dae-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 113~118
The split spectrum processing algorithm of an ultrasonic wave on the tire was studied for the damage detection of a driving vehicle's tire. The processing results of normal and damaged tire was compared using the split spectrum algorithm to estimate the maximum value. The result that used Auto-correlation in case of damaged tire, the damage feature point is detected during 81ms intervals at a speed of 100km/h and during 162ms periodicity at a speed of 50km/h. This results was meaned the possibility for the tire's damage decision by damaging material with using periodicity feature point of tire damage according to vehicle speed.
Requirements for Improvement in Transmission Performance for an Optical Delay Interferometer based Optical Duobinary Transmitters
Lee, Dong-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 119~123
The transmission performance of 10Gb/s optical duobinary transmitters implemented by using a Mach-Zehnder(MZ) modulator and an optical delay interferometer is presented. We investigated the theoretical impact of transmission systems by the modulator driving voltage ratio(=driving voltage/switching voltage) and the optical interferometer time delay to improve transmission distance using computer simulation. By reducing the driving voltage ratio and optimizing the partial bit time delay, the transmission performance has been improved greatly.
The Study on Evaluation of Team Grouping Method using Cooperative Education Program
Kim, Hyun-Jin ; Kim, Seul-Kee ; Kim, Myung-Gwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 125~130
Cooperative learning is a successful teaching strategy in which small teams, each with students of different levels of ability, use a variety of learning activities to improve their understanding of a subject. Each member of a team is responsible not only for learning what is taught but also for helping teammates learn, thus creating an atmosphere of achievement. In this study, we have propose an english, math education program to the children of elementary school and cooperative learning program technique was applied to implement the program. By cooperative learning program, learners will be performed at the same time learning cooperatively. Finally, we have implement a prototype of cooperative learning program and take a usability test with elementary school children. A complementary team to score and mixed was found to be most effective.
Overhearing Energy Efficient Wakeup Schemes in Wireless Sensor Networks
Lee, Byoung-Yong ; Moon, Phil-Joo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 131~136
Reducing the energy consumed by sensor node is a critical issue in wireless sensor networks. In particular, energy in each sensor node is too limited to waste on overhearing of packets that are not relevant. In this paper, we propose a wakeup scheme to reduce overhearing energy through the wakeup time difference between neighboring nodes. Other research papers on wakeup schemes usually focus on decreasing the latency. We propose a technique to reduce wasted energy for overhearing using the wakeup scheme. Simulation results indicate that our proposed wakeup scheme improves the sensor network lifetime.
A Study on Improving Prediction Accuracy by Modeling Multiple Similar Time Series
Cho, Young-Hee ; Lee, Gye-Sung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 137~143
A method for improving prediction accuracy through processing time series data has been studied in this research. We have designed techniques to model multiple similar time series data and avoided the shortcomings of single prediction model. We predicted the future changes by effective rules derived from these models. The methods for testing prediction accuracy consists of three types: fixed interval, sliding, and cumulative method. Among the three, cumulative method produced the highest accuracy.
Prediction on Clusters by using Information Criterion and Multiple Seeds
Cho, Young-Hee ; Lee, Gye-Sung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 145~152
Bayesian information criterion is used to do clustering for time series data. To acquire more stable clusters, multiple seeds are chosen first for the algorithm. Once clusters being set up, most similar time series data in the cluster to the one under consideration are to be chosen for prediction test. These chosen time series data are used to extract valid Markov rules by which we test the prediction accuracy. We confirmed that clustering with multiple seeds led to better prediction performance.
A Study on the Improvement of the Drive-License Test Course using the Hough Transform
Lee, Joon-Taik ; Chung, Dong-Keun ; Chung, Chang-Hwa ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 153~159
This article presents a method that improve the drive-license test system, especially the course-driving by using the image processing. Decision(pass or not) is recorded and informed to test-driver after the image processing such as image capture, grayscaling, normalization, Hough transform and decision. That result system enables us to manage much more economically and effectively.
A Study for Vulnerability Analysis and Guideline about Social Personal Broadcasting Service based on Smart-Phone Environment (focus on SNS or U-Health)
Kang, Jang-Mook ; Lee, Woo-Jin ; Song, You-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 161~167
Social individualized broadcasting increases rapidly in an environment that combines communication and broadcasting. Real-time individualized broadcasting is a service that is provided by multiple individuals to many and unspecified persons. In contrast, newly introduced individualized broadcasting service is a service that has not been experienced socially and culturally and therefore many problems are expected. The newly emerging real-time individualized broadcasting service may bring about various dysfunctions as well as desirable functions. Establishment of guideline and its implementation based in vulnerability analysis are necessary to prevent the expected dysfunctions and reinforce the desirable functions. Therefore, the purpose of this paper is to examine dysfunctions of the information-oriented society which threaten cyber-norms, cyber-morality, cyber-dangers, cyber-democracy, etc. at the level of social individualized broadcasting service and to propose appropriate guidelines. Through this paper, first, future changes of dysfunctions of the information-oriented society due to individualized broadcasting service can be forecast, and countermeasures and policy directions can be proposed. Second, Dysfunctions of ICT-based service that may emerge in individualized broadcasting service can be forecast and correct guideline can be prepared to reduce potential dangers and increase desirable functions of the service. This paper will analyze in various aspects the characteristics of a new media with the focus on individualized broadcasting service among the new ICT-integrated services, and forecast the appearance and aggravation of the dysfunctions and then draw the guideline.
Context-Aware Smart Railroad Crossing Safety Management System based on OSGi Framework
Lee, Seung-Hyun ; Jang, Kyung-Soo ; Ryu, Sang-Hwan ; Shin, Dong-Ryeol ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 169~177
A railroad is used to a lot of area and it is an eco-friendly and an effective means of communication which is a transport for passengers and products. In recent years, the accidents caused by subway and railroad are cognate with people. We need to come up with preparing measures to avoid the accidents. In this paper, to prevent an accident developing and implementing a system which is a railroad management safety system is the purpose. The system is able to provide scalability for smart railroad safety service based on context aware information. Besides, it is able to furnish flexibility through the OSGi framework.
Research of Wireless A/V System Implementations based on Binary CDMA Technology
Lee, Jang-Yeon ; Kil, Yeong-Cheol ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 179~185
In ubiquitous society, there have been increasing demands on safety and security issues with infrastructures and services based on wireless technology. In this paper, we first introduce our own developed technology Binary CDMA to meet those demands. Then we present a wireless A/V surveillance system based on the Binary CDMA technology. The implemented wireless A/V surveillance system is composed of wireless terminals, wireless multiple channel processors, and an A/V management server, and the system gives a hint that the Binary CDMA technology can be adopted in practical ubiquitous systems to handle safety and security issues.
Advertisement Management System utilizing On-Line Music Services in Communication Networks
Kim, Seung-Cheon ; Ro, Kwang-Hyun ; Hwang, Ho-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 187~193
This paper introduces a new mobile advertisement management system (AMS) utilizing on-line music service in communication networks. The developed AMS delivers commercial advertisement through music service that is preferred in communication networks, which enable advertisers to perform a customer based advertisement and listeners to get a discount on their bills for music service. And eventually the proposed AMS can provide the effective commercial service to the advertisers and the effective clients recruit ways to music providers.
Private Music on Demand Service in Wireless/Wired Networks
Kim, Seung-Cheon ; Hwang, Ho-Young ; Ro, Kwang-Hyun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 195~200
This paper introduces a new mobile music service, private music on demand (PMOD), which is implemented by mobile DJ in wireless and wired networks. The newly introduced PMOD service is based on the concept that users can have music services at anytime and by any form they want. The mobile DJ implementing PMOD services, therefore, enables users to do more than simply listening music through networks.
A Study on the Secure Double Pipe Hash Function
Kim, Hie-Do ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 201~208
The classical iterated hash function is vulnerable to a multi-collision attack. Gauravaram et al. proposed 3C and 3C+ hash functions, in which an accumulation chain is added to usual Merkle-Damgard changing. Their goal is to design composition schemes resistant to generic attacks of Joux's type, but Joscak and Tuma have shown that 3C and 3C+ schemes are not better than Merkle-Damgard scheme in term of security against multi-collision attacks under some mild assumptions. In this dissertation, in order to increase security of 3C hash function, we proposed secure double pipe hash function which was effectively using XOR and XNOR operations per blocks of message. We seek to improve on the work of Lucks in a way. Proposed secure double pipe hash function takes resistance to multi-block collision, fixed point and pre-image attacks.
Rehabilitation System through Image Analysis Method
Lim, Myung-Jae ; Jung, Hee-Woong ; Kwon, Young-Man ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 209~214
In this paper, We analyzes the image along the platform (Open Eye), through prevention of dementia or stroke patients and cognitive rehabilitation for the proposed system. This way through the camera image according to user's movement gained OpenCV image processing library, which is based on motion analysis, a part of this rehabilitation is to apply to cognitive rehabilitation. Therefore, this paper proposes a new image analysis system has been exposed to the elderly or stroke patients with dementia, their hand gestures through which patients can detect the image of the cognitive rehabilitation to help them in the analysis of the image analysis system is proposed.
A Method for Access Control on Uncertain Context
Kang, Woo-Jun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 215~223
New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. The prominent database technology challenging these threats is access control. Currently, to keep pace with the new paradigms, new extended access control methods are challenged. We study access control with uncertain context. With respect to access control, it is possible that there is a discrepancy between the syntactic phrase in security policies and that in queries, called semantic gap problem. In our semantic access control, we extract semantic implications from context tree and introduce the measure factor to calculate the degree of the discrepancy, which is used to control the exceed privileges.
Smart Information Monitoring Technology
Kang, Man-Mo ; Lee, Dong-Hyung ; Koo, Ja-Rok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 225~233
Recently, in the field of Smart Grid, Smart Home Network, Ubiquitous Computing, etc. we have continued to study Smart Information Monitoring Technology(SIMT) which exchange, control and monitor information collected and processed by need in real-time and two-way. In this paper, we understand application products or recent trends of SIMT for Energy, U-Farm, Vehicle Information and Home Network. Specially, we explain Google PowerMeter which exchange information with Smart Meter of core part of the smart grid at real-time, Real-time Monitoring System(RMS) for U-Farm, RMS for vehicle status Information. we subscribe Smart Information Monitoring Technology application based on ZigBee of low price, low power or related work. Finally we subscribe actual proof construction situation of Jesu for smart grid.
A Study on Analysis of Electrostatics Destruction of Electronic Equipment
Lee, Du-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 235~241
The static electricity generated by friction of two objects is called frictional electricity. The main cause of troubles in electronic components for military and civil use as well as in military radar appliances is found mostly in parts like LSI memories, particularly when they lose information of function momentarily while in operation, which usually leads to a fatal cause of troubles in the equipment. Troubles occur if electric noise is caused by the spark effected from discharge of static electricity from the equipment that is used nearby.
A Study of the Threshold Voltage of a Symmetric Double Gate Type MOSFET
Lee, Jeong-Ihll ; Shin, Jin-Seob ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 243~249
In this thesis, in order to a equivalent circuit-analytical study for a symmetric double gate type MOSFET, we slove analytically the 2D Poisson's equation in a a silicon body. To solve the threshold voltage in a symmetric double gate type MOSFET from the derived expression for the surface potential which the two-dimensional potential distribution of a symmetric double gate type MOSFET is assumed approximately. This thesis can use short and long channel in a silicon body we introduce a new the threshold voltage model in a symmetric double gate type MOSFET and measure it the distance about the range of channel length up to 0.1 [
Design and Implementation of the Security System using RFID and Biometric Information
Choi, Jae-Kwan ; Lee, Ki-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 251~256
In times past, simple numeric password was the commonly used method in security system. For complement this method, the security system using biometric information is appeared. But it usually uses the scheme to utilize portion of biometric information, and has limited application fields. This biometric security system has low reliability because of some problems such as steal, robbery, and so on. Furthermore, it is associated secondary crime as leaking personal information. For this reason new security system using the unique individual biometric is required. In this paper, we propose the security scheme which used face image and iris analysis. While face image processing for specific person identification, it calculate some feature points of face image and iris's features in our proposed scheme. After person identification applying RFID tags in doorway, several feature information is extracted from camera image, and these compare with registered information of our system for final identification.
Transmission Signal Detection Technique Using Spreading Sequence for Multi-User Cooperative Communication Systems
Kim, Yoon-Hyun ; Park, In-Hwan ; Kim, Jin-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 257~262
In this paper, we propose an effective method for detecting signals among multi-user in cooperative communication system. Spread sequence is inserted to NULL space of synchronization channel to synchronize between each user among frame formats of the cooperative communication and then transmitted. In the receiver, the wanted signal is detected by using correlation among the inserted spread sequences. As simulation results, correlations among the signals using m-sequence in AWGN, Rician, and Rayleigh channel are shown. Using the simulation results in this paper, we expect a reliable cooperative communication.
Performance of Multi-User MIMO/OFDM System using Cyclic Delay Diversity for Fading Channels
Park, In-Hwan ; Kim, Yoon-Hyun ; Kim, Jin-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 263~268
As the demand of high quality service in next generation wireless communication systems, a high performance of data transmission requires an increase of spectrum efficiency and an improvement of error performance in wireless communication systems. In this paper, we propose a multi-user multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system with cyclic delay diversity and block diagonalization procoding method to improve bit error rate (BER) performance with wireless local area network (WLAN) channel model C and D for 802.11n WLAN system. The results of mathlab simulation show the improvement of BER performance in 802.11n wireless indoor channel environment.
Dynamic AOI Management for P2P MMOGs
Lim, Chae-Gyun ; Rho, Kyung-Taeg ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 269~273
Massively Multiplayer Online Game (MMOG) is one of diverse applications where more than hundreds of users enjoy experiencing virtual worlds. Voronoi-based Overlay Network (VON) is proposed to reduce a bandwidth consumption in P2P MMOGs and Vorocast also is made using message forwarding in VON. We propose a dynamic area of interest (AOI) management method that solves problems such as less consistency and high latency due to sending position updates to more neighbor nodes from the message originator in forwarding scheme. Our scheme provides the higher consistency and reduces latency by combining direct connection scheme and Vorocast scheme compared to existing schemes. The proposed model is evaluated through simulations.
A Study of applying Method of Unipolar-ZCD Spreading Code for LED-ID in Interference Environment
Cha, Jae-Sang ; Kim, Jin-Young ; Jang, Yeong-Min ; Kim, Jong-Tae ; Lee, Kyong-Gun ; Moon, Kyung-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 275~280
Recently, This paper suggests that LED-ID technique applying positioning method for LED light. also, Authors in this paper has launched this investigation earnestly. However, there are various interferences such as MPI(Multi Path Interference) by reflected waves of the surface and interfere factors by their correlation properties of the ID in LED-ID wireless channel. Therefore, in this paper, we propose a novel OOK(On-Off Keying)-CDMA(Code Division Multiple Access) system using unipolar ZCD(Zero Correlation Duration) spreading code and verify the availability of the proposed system via the evaluation performance simulation.
A Study of Transmitter Detection Method for LED-ID using OOK-SS Watermarking
Cha, Jae-Sang ; Kim, Jin-Young ; Jang, Yeong-Min ; Lim, Yoon-Sik ; Kim, Jong-Tae ; Lee, Kyong-Gun ; Lee, Min-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 281~285
We propose new identification method of LED location in indoor environment. It can transmit and receive position information and additional data, as applying OOK-SS watermarking method for LED transmission signal. Especially, we use a unipolar form code for watermarking spread code, because LED signal has unipolar characteristic. we analysis LED signal influence and interference with watermarking code, demonstrate usefulness of LED-ID using OOK-SS Watermarking.
Design and Implementation of Computer Architecture's Web based Learning System for Self-directed Learning
Kim, Kyung-Tae ; Lim, Dong-Kyun ; Shin, Seung-Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 287~292
The flow gradually into the Information age to the Information age has changed, leading to the development of computer and communication technology was very important for the value. Of these the most used in computer communication using the Internet, and this proportion accounts for the development of the Internet, the information was established as a means of interaction. In this paper, to improve these problems without the constraints of time and space to allow two-way interactions using web based learning system to enable Computer Architecture were learning. Learn how Computer Architecture using Camtasia the learner, without limitation of time and place of the browser through the Internet to enable real-time learning and assessment appropriate to individual learners and teaching - learning process in conjunction with individual learners can be self-directed learning will play a role in that.
A Development of The Practice Subject in Electronic Circuit Textbook of Industrial High School
Jang, Ki-Hoon ; Lim, Dong-Kyun ; Shin, Seung-Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 293~299
This paper is about a development of effective practice subject in electronic circuit textbook of industrial high school. This paper introduces generally about the practice subject in electronic circuit textbook of industrial high school of the 7th National curriculum and presents problem of current practice and makes an alternative idea that improve current practice. The contents of current electronic circuit textbook of industrial high school have variety topics and these topics are independence and separated. So students have some problems to apply of learned knowledge. Therefore, researcher improved the various electronic circuit practice in current electronic circuit text book and added new practice and manufactured a electronic circuit module based on these circuits. And researcher suggested new practice subject what useful electronic equipment that assembled module of result of electronic circuit practice of each section. When the last subjects are accomplished the students may have feel of achievement and high study effect from these practice. The practice subjects of this paper were manufactured after verification and tested it's performance by computer simulation program.
The Learning System Design and the Implementation using RFID
Lee, Duck-Ju ; Lim, Dong-Kyun ; Shin, Seung-Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 301~306
Thesis is about RFID(Radio Frequency Identification) technology which is recently in the spotlight of overall industry including physical distribution. Most RFID systems in Korea are imported, and there are also problems in manpower. In order to prevent these kinds of problems, students made to get and easy access to RFID system. The purpose of is to solve the regulation problems. We made an application software to practice RFID system implemented, which have several modules so that it can be easy for users to understand RFID system. We also invented a system which makes student ID to help users understand how RFID system is implemented in real life.
A Fast Recovery Backoff Mechanism for Wireless LAN
Yoon, Hee-Don ; Kim, Tae-Hyun ; Cho, Seong-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 307~315
Although a substantial amount of studies have been carried out in order to improve the performance of IEEE 802.11, most of them focused on how to slowly decrease the Contention Window size, instead of resetting it to its initial value. Slow decreasing of the window size reduces the collision probability and increases the channel throughput. Therefore, it is difficult to achieve good results in a heterogeneous network which coexists with the original DCF. For instance, a Gentle DCF(GDCF) has good performance in a homogeneous environment, while it can hardly transmit frames in a heterogeneous environment including the original DCF. It is because the slow decreasing of the window size reduces the transmission probability. In this paper, we propose a Fast Recovery DCF(FRDCF) to solve this problem. In the FRDCF, the reset mechanism of the original DCF is maintained to keep the transmission probability high, while a new counter is used to enhance the performance of the wireless LAN. We prove that, compared with the GDCF, the FRDCF has better performance in a heterogeneous wireless LAN.
Study on the Performance Analysis of Push-Pull Strategy by Multicharts' Portpolio
Ko, Young-Hoon ; Kim, Yoon-Sang ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 10, issue 6, 2010, Pages 317~324
This paper analyses the performance of push-pull strategy by Multicharts' portpolio tool. This strategy decreases a risk of option sell by moving an exercise price to outward and compensates the profit by doubling contracts. This strategy also makes risk-free option sell to move inward for earning gain. This strategy basically uses several symbols. And this feature makes impossible to use a portpolio tool. However, This paper provides the method to use it with extracting intrinsic data from a symbolname. As an experiment for one month of september experiment options, it shows 1.5 million won in case of 5-displace and also shows 32 million won in case of 2.5-displace. If a Margin is enough, this strategy always earns profit, but it's difficult to be applicated in real trades because of a margin risk.