Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 13, Issue 6 - Dec 2013
Volume 13, Issue 5 - Oct 2013
Volume 13, Issue 4 - Aug 2013
Volume 13, Issue 3 - Jun 2013
Volume 13, Issue 2 - Apr 2013
Volume 13, Issue 1 - Feb 2013
Selecting the target year
2D Digital Image Processing Using High Density Discrete Wavelet Transformation
Lim, Joong-Hee ; Shin, Jong-Hong ; Jee, Inn-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 1~8
DOI : 10.7236/JIIBC.2013.13.1.1
High-density discrete wavelet transformation is one way to overcome the disadvantages of the standard wavelet transform of shift invariant because it increases the number of subband signals. In this paper, high-density discrete wavelet transform consisting of three channels is applied in a two-dimensional image processing. Experimental results show that the proposed method is well satisfied with the shift invariant and is excellent directional selectivity because it could generate many subband images.
Implementation of Intellectual Noninsertion Kegel Trainer
Yoon, Dal-Hwan ; Yeun, Sang-Ho ; Kang, Byung-Mo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 9~18
DOI : 10.7236/JIIBC.2013.13.1.9
In this paper, we have developed the intellectual kegel trainer with the biofeedback. The pelvic muscles of female are composed of a slow twitch fiber and a fast twitch fiber. If two twitch fiber be not well done, then the urine be frequently called by nature. In order to recover the function of pelvic muscles, we use the kegel trainer with biofeedback training. Such a trainer make strengthen the weakness pelvic muscles by biofeedback training and get exercise the pelvic muscles in physical suppress of 10 kg. The biofeedback training against the physical suppress can have strengthen the pelvic muscles and can display the operation graph of strengthen movement in monitor.
The Performance Comparison of MMA and S-MMA Adaptive Equalization Algorithm for QAM Signal
Kang, Dae-Soo ; Lim, Seung-Gag ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 19~26
DOI : 10.7236/JIIBC.2013.13.1.19
This paper deals with the performance comparison of blind adaptive equalization algorithm, the MMA and S-MMA, that is used for compensation of the amplitude and phase distortion simultaneously which occurs in the time dispersive channel. The present CMA algorithm is possible to compensates the amplitude only, but not in phase, so it needs to the another additional circuit for compensating the phase. In order to overcoming the abovemensioned shorthand, the improved cost function is applied to the MMA algorithm. In MMA algorithm, the error is consists of the dispersion constant only, but in S-MMA, the error is consists of the dispersion constant considering the output of decision device (sliced symbol) in order to updating the tap coefficients. By using the two kind error signal, the adaptive equalization algorithm has different performance. In this paper, we compare to the adaptive equalization algorithm performance by using the recovered constellation, residual isi, MD (Maximum Distortion) and SER as a index when the transmitting signal is 16 and 64-QAM and then passing through the same communication channel. As a result of simulation, the S-MMA can improving the Roburstness in SER performance compared to the MMA in the high order QAM signal.
The Performance Analysis of CCA Adaptive Equalization Algorithm for 16-QAM Signal
Lim, Seung-Gag ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 27~34
DOI : 10.7236/JIIBC.2013.13.1.27
This paper deals with the performance anlysis of CCA adaptive equalization algorithm, that is used for reduction of intersymbol interference at the receiving side which occurs in the time dispersive communication channel. Basically, this algorithm is borned for the solving phase unrecovery problem in the CMA equalizer, and the comines the concept of DDA (Decision Directed Algorithm) and RCA (Reduce Constellation Algorithm). The DDA has a stable convergence characteristics in unilevel signal, but not in the number of levels in multilevel signal such as QAM, so it has unstable problem. The RCA does not provide reliable initial convergence. And even after convergence, the equalization noise due to the steady state misadjustment exhibited by it is very high as compared to DDA. For the solving the abovemensioned point, the CCA adaptive eualization alogorithm has borned. In order to performance analysis of CCA algorithm, the recovered signal constellation that is the output of the equalizer, the convergence characteristic by the residual isi and MD (maximum distortion), the SER characteristic are used by computer simulation and it was compared with the DDA, RCA respectively. As a result of simulation, the DDA has superior performance than other algoithm, but it has a convergence unguarantee and unstability in the multilevel signal. In order to solving this problem, the CCA has more good performance than RCA in every performance index.
Message Forwarding System based on User's Context
Kim, Namyun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 35~40
DOI : 10.7236/JIIBC.2013.13.1.35
The messages on mobile terminal may contain context information such as user's location, time and preference. This paper proposes message forwarding system based on user's context. The server stores the predefined target addresses which may be mobile phone number, web server address and email address. On request for message transmission, the server tries to find a target address matching a user's context. Thus, a sender transmits messages to a representative address without knowing various receiver's addresses and a receiver can retrieve classified messages according to subject/location.
The Design of Underground Utilities Management System based on Mobile Augmented Reality Technology
Baek, Jang-Mi ; Hong, In-Sik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 41~47
DOI : 10.7236/JIIBC.2013.13.1.41
A great number of people all over the world are using smart phones. Researchers develop innovative technology of App. It's make rapid progress now that the country's infrastructure is computerized, we expect IT Technological Convergence. In this paper, designs underground utilities management system based on mobile augmented reality technology, and architecture configuration, interface development. Proposal system minimizes overhead of smart devices belonging to engineer's representative using wireless personal area networks. Center Server technology manages transmitted data from engineer's representative, it monitors client data path. And it provies information processing capacity for event generation module. Such event has connotations of instability and uncertainty.
PAPR Reduction for WPM Schemes using Filter Design Schemes
Lee, Kyu Seop ; Choi, Gin Kyu ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 49~54
DOI : 10.7236/JIIBC.2013.13.1.49
WPM(Wavelet Packet Modulation) is multicarrier system which is suitable for high speed transmission. The main advantage of using the WPM system is the fact that the flexible system effectively can be realized by the combination of filter coefficient. On the other hand, the major problem of multicarrier system is known to be the high PAPR. In this paper we propose WPM system that has a minimum PAPR by using filter coefficient adjustment method. We first derive the filter coefficient equation and then select the coefficient that has a minimum PAPR. we conduct WPM system by using a selected coefficient and we demonstrate the system performance by using computer simulation.
3D Analysis System for Copper Palate Defect Detection
Oh, Choon-Suk ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 55~62
DOI : 10.7236/JIIBC.2013.13.1.55
Automatic inspection system is required for increment of copper plate production and demand expansion. Thus 3D surface form and defect detection of copper plate calls for 3D image and GUI analysis. Limitation of 2D analysis, such as error occurrence and decision difficulty makes eye inspection automatic. Automatic inspection is able to raise accurate inspection rate and productivity efficiency elevation. In this paper defect classification is defined and inspection system is implemented. Defect analysis algorithms and GUI for 3D image analysis is developed and tested.
Automatic 5 Layer Model construction of Business Process Framework(BPF) with M2T Transformation
Seo, Chae-Yun ; Kim, R. Youngchul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 63~70
DOI : 10.7236/JIIBC.2013.13.1.63
In previous research, we suggested a business process structured query language(BPSQL) for information extraction and retrieval in the business process framework, and used an existing query language with the tablization for each layer within the framework, but still had a problem to manually build with the specification of each layer information of BFP. To solve this problem, we suggest automatically to build the schema based business process model with model-to-text conversion technique. This procedure consists of 1) defining each meta-model of the entire structure and of database schema, and 2) also defining model transformation rules for it. With this procedure, we can automatically transform from defining through meta-modeling of an integrated information system designed to the schema based model information table specification defined of the entire layer each layer specification with model-to-text conversion techniques. It is possible to develop the efficiently integrated information system.
Worm Detection and Containment using Earlybird and Snort on Deterlab
Lee, Hyeong-Yun ; Hwang, Seong-Oun ; An, Beongku ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 71~76
DOI : 10.7236/JIIBC.2013.13.1.71
A computer worm is a standalone malware computer program that probes and exploits vulnerabilities of systems. It replicates and spreads itself to other computers via networks. In this paper, we study how to detect and prevent worms. First, we generated Codered II traffic on the emulated testbed called Deterlab. Then we identified dubious parts using Earlybird and wrote down Snort rules using Wireshark. Finally, by applying the Snort rules to the traffic, we could confirmed that worm detection was successfully done.
Implementation of Distributed Feedback Filters using Cascaded Gratings with Different Period
Ho, Kwang-Chun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 77~82
DOI : 10.7236/JIIBC.2013.13.1.77
The filtering characteristics of planar distributed feedback (DFB) waveguides composed by gratings with different period are solved using equivalent transmission-line network. To analyze explicitly its band-pass and resonance properties, a longitudinal modal transmission-line theory (L-MTLT) based on Floquet's theorem and Babinet's principle is newly developed. The numerical results reveal that this approach offers a simple and analytic algorithm to analyze the filtering characteristics of cascaded DFB structure with different period, and the bandwidth and side-lobe suppression of cascaded DFB filter are sensitively dependent on the variation of aspect ratio and the number of grating at each region.
A Study of Similar Blog Recommendation System Using Termite Colony Algorithm
Jeong, Gi Sung ; Jo, I-Seok ; Lee, Malrey ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 83~88
DOI : 10.7236/JIIBC.2013.13.1.83
This paper proposes a recommending system of the similar blogs gathered with similarities between blogs according to the similarity, dividing words, for each frequency, that individual blogs have. It improved the algorithm of k-means, using the model of the habits of white ants for better performance of clustering, and showed better performance of clustering as a result of evaluating and comparing with the existing algorithm of k-means as the improved algorithm. The recommending system of similar blog was designed and embodied, using the improved algorithm. TCA can reduce clustering time and the number of moving time for clustering compare with K-means algorithm.
A Study on Correlation Interference Signal Cancellation Algorithm for Target Estimation in Multi Input Multi Output
Lee, Kwan-Hyeong ; Song, Woo-Young ; Lee, Myeong-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 89~93
DOI : 10.7236/JIIBC.2013.13.1.89
This paper is estimating a target direction of arrival with incident to receiver in spatial. This paper presented covariance using constraint matrix to correlation interference signal cancellation in multi input multi output array antennas system. we proposed a target direction of arrival estimation algorithm using cost function and minimum variance method. Through simulation, we were analysis a performance to compare general SPT-LCMV algorithm and proposal algorithm. We showed that proposal algorithm improve more target estimation than general SPT-LCMV algorithm in direction of arrival.
The Impact of the Emotional Intelligence of Elementary School Students by Using Smart Devices
Kwon, Mee-Rhan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 95~99
DOI : 10.7236/JIIBC.2013.13.1.95
This study empirically analyzed between the use hours and the emotional intelligence of elementary school students and also, analyzed between the exercise time and the emotional intelligence of elementary school students. As a result of the regression analysis, the smart devices using time of elementary school students impact on the emotional intelligence of elementary school students. We also concluded there is no relationship between the exercise time and emotional intelligence of elementary school in the regression analysis. It seems that additional research is needed, existing studies and obtained different results for sports activities and emotional intelligence in the future.
A Study on Prediction the Movement Pattern of Time Series Data using Information Criterion and Effective Data Length
Jeon, Jin-Ho ; Kim, Min-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 101~107
DOI : 10.7236/JIIBC.2013.13.1.101
Is generated in real time in the real world, a large amount of time series data from a wide range of business areas. But it is not easy to determine the optimal model for the description and understanding of the time series data is represented as a dynamic feature. In this study, through the HMM suitable for estimating the short and long-term forecasting model of time-series data to estimate a model that can explain the characteristics of these time series data, it was estimated to predict future patterns of movement. The actual stock market through various materials, information criterion and optimal model estimation for the length of the most efficient data was found to accurately estimate the state of the model. Similar movement patterns predictive than the long-term prediction is more similar to the short-term prediction of the experimental result were found to be.
Routing Protocol based on Data Aggregation with Energy Efficiency in Underwater Wireless Sensor Networks
Heo, Junyoung ; Min, Hong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 109~114
DOI : 10.7236/JIIBC.2013.13.1.109
In underwater wireless sensor networks, sensing data such temperature and salinity can be merged by averaging them. Data aggregation is a good choice to reduce the amount of packets and save energy in underwater wireless sensor networks. However, data aggregation could bring about packet delay and non-directional transmission to the sink. In this paper, we propose a new path building algorithm based on data aggregation to mitigate these problems. The paper reduces the delay without wireless interferences and maximizes the energy efficiency by removing the non-directional transmission to the sink. Experimental results show that the proposed algorithm outperforms in terms of the energy efficiency and the packet delay.
Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks
Heo, Junyoung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 115~120
DOI : 10.7236/JIIBC.2013.13.1.115
There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.
Implement of Hand Gesture Interface using Ratio and Size Variation of Gesture Clipping Region
Choi, Chang-Yur ; Lee, Woo-Beom ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 121~127
DOI : 10.7236/JIIBC.2013.13.1.121
A vision based hand-gesture interface method for substituting a pointing device is proposed in this paper, which is used the ratio and size variation of Gesture Region. Proposed method uses the skin hue&saturation of the hand region from the HSI color model to extract the hand region effectively. This method can remove the non-hand region, and reduces the noise effect by the light source. Also, as the computation quantity is reduced by detecting not the static hand-shape recognition, but the ratio and size variation of hand-moving from the clipped hand region in real time, more response speed is guaranteed. In order to evaluate the performance of the our proposed method, after applying to the computerized self visual acuity testing system as a pointing device. As a result, the proposed method showed the average 86% gesture recognition ratio and 87% coordinate moving recognition ratio.
A Study on Automatic Test Case Extraction Mechanism from UML State Diagrams Based on M2M Transformation
Kim, Dong-Ho ; Kim, R. Youngchul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 129~134
DOI : 10.7236/JIIBC.2013.13.1.129
Previous research is focus on testcase generation automation using message sequence diagram based on metamodel. but that research is not enough for testcase genaeration automation using state diagram based metamodel. so in this paper is adopt Model Driven Architecture (MDA) mechanism for using metamodel and model transformation. and we suggest testcase automation mechanism using state diagram in UML. we will decrease cost of embedded software design and testcase genaration and increase quality of embedded software using metamodel mechanism.
Edge Grouping and Contour Detection by Delaunary Triangulation
Lee, Sang-Hyun ; Jung, Byeong-Soo ; Jeong, Je-Pyong ; Kim, Jung-Rok ; Moon, Kyung-li ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 135~142
DOI : 10.7236/JIIBC.2013.13.1.135
Contour detection is important for many computer vision applications, such as shape discrimination and object recognition. In many cases, local luminance changes turn out to be stronger in textured areas than on object contours. Therefore, local edge features, which only look at a small neighborhood of each pixel, cannot be reliable indicators of the presence of a contour, and some global analysis is needed. The novelty of this operator is that dilation is limited to Deluanary triangular. An efficient implementation is presented. The grouping algorithm is then embedded in a multi-threshold contour detector. At each threshold level, small groups of edges are removed, and contours are completed by means of a generalized reconstruction from markers. Both qualitative and quantitative comparison with existing approaches prove the superiority of the proposed contour detector in terms of larger amount of suppressed texture and more effective detection of low-contrast contour.
A Minimum Cut Algorithm Using Maximum Adjacency Merging Method of Undirected Graph
Choi, Myeong-Bok ; Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 143~152
DOI : 10.7236/JIIBC.2013.13.1.143
Given weighted graph G=(V,E), n=|V|, m=|E|, the minimum cut problem is classified with source s and sink t or without s and t. Given undirected weighted graph without s and t, Stoer-Wagner algorithm is most popular. This algorithm fixes arbitrary vertex, and arranges maximum adjacency (MA)-ordering. In the last, the sum of weights of the incident edges for last ordered vertex is computed by cut value, and the last 2 vertices are merged. Therefore, this algorithm runs
times. Given graph with s and t, Ford-Fulkerson algorithm determines the bottleneck edges in the arbitrary augmenting path from s to t. If the augmenting path is no more exist, we determine the minimum cut value by combine the all of the bottleneck edges. This paper suggests minimum cut algorithm for undirected weighted graph with s and t. This algorithm suggests MA-merging and computes cut value simultaneously. This algorithm runs n-1 times and successfully divides V into disjoint S and V sets on the basis of minimum cut, but the Stoer-Wagner is fails sometimes. The proposed algorithm runs more than Ford-Fulkerson algorithm, but finds the minimum cut value within n-1 processing times.
Optimal Algorithm for Transshipment Problem
Lee, Sang-Un ; Choi, Myeong-Bok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 153~162
DOI : 10.7236/JIIBC.2013.13.1.153
This paper proposes the most simple method for optimal solution of the transshipment problem. Usually the transshipment problem is solved by direct linear programming or TSM (Transportation Simplex Method). The method using TSM has two steps. First it is to get a initial solution using NCM, LCM, or VAM, second to refine the initial solution using MOD or SSM. However the steps is complex and difficult. The proposed method applies the method that transforms transshipment problem to transportation problem. In the proposed method it simply selects the minimum cost of rows about transportation problem, and then it applies the method that assigns a transported volume as an ascending sort of the costs of rows about the selected costs. Our method makes to be very fast got the initial value. Also we uses the method that controls assignment volume, if a heavy item of cost is assigned to a transported volume and it has a condition to be able to transform to more lower cost. The proposed algorithm simply got the optimal solution with applying to 11 transshipment problem.
A Performance Study of Embedded Multicore Processor Architectures
Lee, Jongbok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 163~169
DOI : 10.7236/JIIBC.2013.13.1.163
Recently, the importance of embedded system is growing rapidly. In-order to satisfy the real-time constraints of the system, high performance embedded processor is required. Therefore, as in general purpose computer systems, embedded processor should be designed as multicore architecture as well. Using MiBench benchmarks as input, the trace-driven simulation has been performed and analyzed for the 2-core to 16-core embedded processor architectures with different types of cores from simple RISC to in-order and out-of-order superscalar processors, extensively. As a result, the achievable performance is as high as 23 times over the single core embedded RISC processor.
Image Features Based Secure Access Control for Data Content Protection
Ha, Sunju ; Park, Daechul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 171~180
DOI : 10.7236/JIIBC.2013.13.1.171
Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.
A Surveillance System Using Images and Movement Detection Sensors
Che, Zhong-Yong ; Kim, Sangchul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 181~189
DOI : 10.7236/JIIBC.2013.13.1.181
Since conventional image surveillance systems employ methods for video recording and transmission, a huge amount of data is transferred and stored so that those systems are overloaded. However, for capturing and recording the scenes of illegal trash throwing and unpermitted parking, it is sufficient to use a surveillance system using images. In this paper, we propose a surveillance system using images and motion detection sensors. Our system recognizes the occurrence of movement events through changes of sensors, captures still images of the region under surveillance, and stores them into the database at a remote site. The system proposed herein provides a functionality to detect the occurrent of those events more accurately and faster than previous video-based systems, and has an advantage of reducing the amount of data significantly. Also, our system is agent-based, it enables us to add new modules or modify existing modules easily later.
Implementation of Facility Maintenance Management System using Smart Phones
Joo, Young-Do ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 191~197
DOI : 10.7236/JIIBC.2013.13.1.191
Recently, the demand for mobile systems is remarkably growing due to the explosive spread of smart phones. The mobile system based on the smart phones enables the real time communication and business process by utilizing the on-line information on the spot anytime and anywhere. This paper proposes a development model to use android-based mobile applications to be applicable to the facility defect maintenance management in apartment buildings. The proposed methodology aims to implement an incorporated system to bind the web-based system and the mobile system in systematic interaction in order to feasibly realize the concept of mobile office.
A Study on the Voice Interface for Mobile Environment
Kim, Soo-Hoon ; Ahn, Jong-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 199~204
DOI : 10.7236/JIIBC.2013.13.1.199
Google's android-based voice interface is limited to the web application and the users are rare. In this paper, We suggest the method that can be done using existing android-based voice engine and develope voice application. We also study the environments of android-based voice interface and present the appropriate voice interface in mobile environment.
A Study of License acquisition Method Supporting Mutual Compatibility of EPUB-based eBook DRM
Kim, Tae-Hyun ; Kang, Ho-Gap ; Kim, Yoon-Ho ; Cho, Seong-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 205~214
DOI : 10.7236/JIIBC.2013.13.1.205
The study of the compatibility of EPUB DRM, granted by the Korea Copyright Commission, as a CT R & D project (Project Title: Development of standard reference software technology for the International Standard EPUB-based eBook DRM) developed standards such as profile standards for encryption, digital signature and authentication certificates and standards for technical terms of rights information. In 2012, these four standards have been established as the Korean Industrial Standards under the names of 'Encryption specification for EPUB DRM', 'the Digital signature specification for EPUB DRM', 'the Certificate specification for EPUB DRM', and 'Definitions of Right Terms for EPUB DRM' through the ODPF(Open Digital Standardization Forum) and the TTA(Telecommunications Technology Association). In spite of the establishment of the eBook DRM standards, however, the absence of the standard technology which supports the compatibility for issues and changes of licenses makes it unable to use eBooks served by different eBook distributors. This study tries to investigate technological approaches to methods of license issues supporting eBook DRM compatibility on the basis of the above-mentioned four EPUB DRM standards and to provide an industrially accepted technological model.
Radio Propagation Characteristics Analysis for Various Receiving Environments of Satellite Communication on Ka-band
Park, No-Uk ; Kim, Joo-Seok ; Lim, Ju-Young ; Lim, Tae-Hyuk ; Yoo, Chang-Hyun ; Kwon, Kun-Sup ; Kim, Kyung-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 215~220
DOI : 10.7236/JIIBC.2013.13.1.215
In this paper, the signal reception environment of the satellite communications was analyzed on urban, suburban and rural environment. The correct analysis of received environment is very important in the satellite communications because the presence of various attenuation factors. Analyze attenuation factor through the simulation and that apply to each receiving environment. The urban and suburban various received sensitivity is determined according to building height and density. Moreover, attenuation occurs in rural areas due to the mountainous and vegetation. In this paper, we analysis of variety receiving environment according to movement of the ground station and the satellites can be utilized to provide stable multimedia services.
Implementation of a dynamic high-performance Notch Filter for Power-Line Communications
Shin, Seong-Kyun ; Lee, Byung-Jin ; Jang, Dong-Won ; Kim, Kyung-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 221~227
DOI : 10.7236/JIIBC.2013.13.1.221
Recent studies have been conducted on powerline communications as a viable alternative to the spread of the spread of the Internet and the Internet as the chief source of information act in the information age, the internet does not reach local Last Mile Solution. Powerline communication, but because it has been designed to transfer power to the high frequency signal to be sent when the close of wireless communications services impacted. The notch filters of a common way to eliminate the interference are used. In this paper, a dynamic high-performance notch filter applying WDF performance was verified through MATLAB and was implemented using a TI's TMS320C6416T DSP board.
A Study on Relative Positioning based on Acoustic Signal of Smart phone
Oh, Jongtaek ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 229~234
DOI : 10.7236/JIIBC.2013.13.1.229
As the popularization and proliferation of smart phone and location based services, the necessity and importance of the location based service based on the smart phone becomes significant. But existing technologies could not be applied in real situation due to the lack of accuracy, economy, and convenience, the method using the signal strength of WLAN is not accurate. In this paper, the technical back ground, implementation issue, and measurement result are described for the proposed relative positioning technology using acoustic signal and Bluetooth with smart phone. It is possible to measure the position of the smart phone with accuracy and simple device, and it is very proper especially for the indoor location based intelligent services.
Social Phenomena and Challenges for Internet Fandom Culture (Be Focussed on the Method of Link Value and Scalability for Korea Wave Fandom)
Kang, Jang-Mook ; Song, You-Jin ; Choi, Mi-Kyung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 235~241
DOI : 10.7236/JIIBC.2013.13.1.235
This article examines the Internet fandom culture of YouTube and Facebook and Twitter for Korea Wave Fandom. This article the principle of shared network connection and re-mediated and looked at in terms of the spread and the value passed. Useful field of view which korea wave look forward to continue to release and Challenges. At the same time, Korea wave fandom optimized to analyze and understand the fundamental principles of the SNS, the new media and the spread of the wave, the need arises. Korea Wave fandom connection value granted, through the process of tracking. Watch for them through the propagation and spread of Korean culture and virtuous principles. Korea Wave fandom research this article in the future for fandom korea wave and dig into the more fundamental principles of deductive help understand expected.
Calculation of Dumping Vehicle Trajectory and Camera Coordinate Transform for Detection of Waste Dumping Position
Lee, Dong-Gyu ; Lee, Young-Dae ; Cho, Sung-Yun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 243~249
DOI : 10.7236/JIIBC.2013.13.1.243
In waste repository environment, we can process the waste history efficiently for reuse by recording the history trajectory of the vehicle which loaded waste and the dumping position of the waste vehicle. By mapping the unloaded waste to 3D and by extracting the dumping point, a new method was implemented so as to record the final dumping position and the waste content under various experiments. In this paper, we developed the algorithm which tracking the vehicle and deciding the moment of dumping in landfills. We first trace the position of vehicle using the difference image between current image and background image and then we decide the stop point from the shape of vehicle route and detect the dumping point by comparing the dumping image with the image that vehicle is stopping. From the camera parameters, The transform method between screen coordinate and real coordinate of landfills is proposed.
Period Detection of Randomness Ultrasonic Signal Occurred Repeatedly by a Tire Damage
Jung, Sun-Yong ; Kang, Dae-Soo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 251~258
DOI : 10.7236/JIIBC.2013.13.1.251
We studied it about ways to detect damage of a tire about randomness ultrasonic signal which occurs repeatedly while rub a tire of driving car and a road surface. The signal randomness is decreased through the preprocess of short-time energy calculation and the average value of coherence function is used by the normalization expression of the signal randomness. The process limit that can be decide on the dominant period of a signal using the coherence threshold is analyzed and the algorithm to decide the dominant period is proposed by setting up the -3dB threshold of the maximum value on the power spectrum.
A TDMA-based Relay Protocol for Voice Communication on a Small Group
Hwang, Sangho ; Park, Chang-Hyeon ; Ahn, Byoungchul ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 259~266
DOI : 10.7236/JIIBC.2013.13.1.259
Since the wireless communications have a limited transmission, the devices just around a master node can exchange data. Though Bluetooth and Zigbee support ad hoc, they are not appropriate for real-time voice communications. In this paper, we present a TDMA-based relay protocol for several users to communicate simultaneously. The proposed protocol can relay data or voice to other nodes in real-time by the multi-hop transmission method using TDMA. And the proposed protocol improves the network performance by allocating different frequencies to the slaves depending on the routing path scheduled by the routing table. NS-2 simulation shows that the performance of the proposed protocol is good in terms of the transmission delay and pecket loss probability in the real-time voice transmission.
Development of Location Information Service App Using an Open Source for Augmented Reality
Son, Jeong-Gi ; Joo, Bok-Gyu ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 267~272
DOI : 10.7236/JIIBC.2013.13.1.267
Augmented Reality(AR) is one of branch of virtual reality computer graphics techiniques that places images of both the real environments and virtual graphic objects over the user's view of the world. Recently, useful apps are being developed using the AR techniques. We developed the location information service app by applying AR techniques. We used the open source 'Mixare' for AR application development for smartphones. This paper presents the design and development of the app 'Go-To-Hongdae~' that shows street views and related detailed information in real-time about buildings around our campus.
Security Analysis of a Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment
Yang, Hyung-Kyu ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 1, 2013, Pages 273~278
DOI : 10.7236/JIIBC.2013.13.1.273
Recently, user authentication schemes using smart cards for multi-server environment have been proposed for practical applications. In 2009, Liao-Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment that can withstand the various possible attacks and provide user anonymity. In this paper, we analyze the security of Liao-Wang's scheme, and we show that Liao-Wang's scheme is still insecure against the forgery attack, the password guessing attack, the session key attack, and the insider attack. In addition, Liao-Wang's scheme does not provide user anonymity between the user and the server.