Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 13, Issue 6 - Dec 2013
Volume 13, Issue 5 - Oct 2013
Volume 13, Issue 4 - Aug 2013
Volume 13, Issue 3 - Jun 2013
Volume 13, Issue 2 - Apr 2013
Volume 13, Issue 1 - Feb 2013
Selecting the target year
An Efficient Log Data Management Architecture for Big Data Processing in Cloud Computing Environments
Kim, Julie ; Bahn, Hyokyung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 1~7
DOI : 10.7236/JIIBC.2013.13.2.1
Big data management is becoming increasingly important in both industry and academia of information science community. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used as information for qualification. This paper presents a big data management architecture specialized for log data. Specifically, it provides the aggregation of log messages sent from multiple clients and provides intelligent functionalities such as analyzing log data. The proposed architecture supports an asynchronous process in client-server architectures to prevent the potential bottleneck of accessing data. Accordingly, it does not affect the client performance although using remote data store. We implement the proposed architecture and show that it works well for processing big log data. All components are implemented based on open source software and the developed prototypes are now publicly available.
Design of a Model Based Controller with Safety
Shin, Bum-Sik ; Park, Jeong-Hoon ; Moon, Chan-Woo ; Ahn, Hyun-Sik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 9~14
DOI : 10.7236/JIIBC.2013.13.2.9
Model based design method reduces product development period and increases system software safety. In this paper, a BLDC motor controller based on model based design method is designed with Simulink and implemented with auto generated code which is written in C language. To retain the safety of software, this model is implemented according to MISRA AC SLSF guide. The validity of the implemented controller is verified with a real position control experiment, and execution times of each control loops are measured to compare the system performance of the conventional design and the model based design.
Session Management and Control Architecture for N-Screen Services
Kim, Jae-Woo ; Ullah, Farman ; Sarwar, Ghulam ; Lee, Hyun-Woo ; Lee, Sung-Chang ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 15~23
DOI : 10.7236/JIIBC.2013.13.2.15
In this paper, we propose a session management and control architecture for N-Screen services, which enable users to change devices and transfer contents among user`s devices during service by session transfer and split. In N-Screen services, users may have multiple devices with different attribute such as screen resolution, CPU capability and access network interfaces. Also, since users may change devices during service, or one user may use multiple stream, N-Screen services need to enable the user to share and transfer contents across N-Screen devices. We introduce the management and control servers to provide session split over user multiple devices and session continuity while changing device. Furthermore, the proposed architecture provides the device capabilities aware session continuity. In addition, the proposed scheme minimizes the session transfer delay and content server processing load. We present results that show the effectiveness and usefulness of proposed architecture.
A Study on Turning Characteristics of Vehicle Based on Parameters of Curved Road
Yang, Sung-Hoon ; Lee, Hak-Yong ; Yoon, Jun-Kyu ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 25~32
DOI : 10.7236/JIIBC.2013.13.2.25
Entry speed of the vehicle and lateral acceleration acting on the vehicle, roll-angle associated with the overthrow, and then the structure of the road, the friction of road surface are important factors in turning on the curved road. In this study, we analyzed the state change of the vehicle causing entry speed of the vehicle and superelevation of the road, the friction coefficient by using a PC-crash Program for traffic accident reconstruction. As a result, when vehicle is turning the curved road, we could ascertain that the structure of the road and state of the road surface are a major factor about the set up of limited speed.
Design of X/Ku band Waveguide Diplexers with H-plane T-junction
Eum, Jeong-Hee ; Choi, Hak-Keun ; Song, Choong-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 33~39
DOI : 10.7236/JIIBC.2013.13.2.33
In this paper, X/Ku band waveguide diplexers with H-plane T-junction for satellite communication systems is proposed and its characteristics is cinfirmed. Two frequency bands such as X(7.25 ~ 8.4 GHz) and Ku(12.25 ~ 14.5 GHz) can be separated by the proposed waveguide diplexers. A diplexers is normally including low pass filter, high pass filter and junction waveguide. To simplify the structure of the proposed diplexers, the proposed waveguide diplexers is using impedance matching technique on H-plane of the high pass filter without low pass filter. To use vertical and horizontal polarization, the proposed diplexers with orthomode transducer(OMT) characteristics is also designed. Therefore, it is confirmed that the proposed waveguide diplexers can be used as dual-band and dual-polarization diplexers for satellite communication feed systems.
Design of Low Pass Filters Using Corrugated Waveguide for Satellite Communications
Kim, Hwe-Jong ; Choi, Hak-Keun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 41~46
DOI : 10.7236/JIIBC.2013.13.2.41
In this paper, low pass filters(LPF) using corrugated waveguide for satellite communication is proposed. To design the proposed LPF, the corrugated waveguide and impedance transformers are combined. The corrugated waveguide is formed by arrangement of T-junction. To obtain low insertion loss and high isolation propriety, T-junction is designed by using Chebyshev function. Impedance transformers is designed by combining T-junction with different heights at both ends of the corrugated waveguide to get high return loss. The measured results of the proposed LPF have a return loss of over 35.4 dB, a insertion loss of less than 0.1 dB from 12.25 GHz to 12.75 GHz and a isolation propriety of over 54.5 dB from 14 GHz to 14.5 GHz. From these results, it is confirmed that the proposed waveguide LPF can be used for satellite communication.
Modal Characteristics of Plasmonic Multimode Interference Couplers with Stepped Structure
Ho, Kwang-Chun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 47~52
DOI : 10.7236/JIIBC.2013.13.2.47
A novel architecture to reduce dramatically the coupling length of multimode interference-based couplers (MMICs) is proposed by replacing conventionally designed MMICs by cascaded two-section plasmonic stepped MMICs (PS-MMIC). For the 60% cross power splitting ratio in a stepped-width MMIC, the coupling length of device results in around 42% length reduction. Furthermore, the power splitting ratio and coupling length of plasmonic MMIC just vary around 1~2% along the variation of refractive index. On the contrast, those factors for the variation of MMIC`s width strongly vary around 30~40%.
A New Packet-level Load-balancing Scheme for Fat-Trees
Lim, Chansook ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 53~58
DOI : 10.7236/JIIBC.2013.13.2.53
A Fat-Tree topology has multiple paths between any pair of hosts. The delay for the multiple paths with an equal number of hops depends mainly on the queuing delay. However, most of the existing load-balancing schemes do not sufficiently exploit the characteristics of Fat-Tree. In most schemes load-balancing is performed at a flow level. Packet-level load-balancing schemes usually require the availability of special transport layer protocols to address packet reordering. In this paper, we propose a new packet-level load-balancing scheme which can enhance network utilization while minimizing packet reordering in Fat-Trees. Simulation results show that the proposed scheme provides as high TCP throughput as a randomized flow-level Valiant load balancing scheme for a best case.
Study on Comparison of an I/O Program Execution Time to Intel Series μPs : 8085, 8086, 8051 and 80386
Lee, Young-Wook ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 59~65
DOI : 10.7236/JIIBC.2013.13.2.59
Microprocessors of 8 to 16 bits have become the first step of today`s computer development with excellent capability and a lot of those are still used in the educational spots. In this study, execution times of Intel series microprocessors(
) available to microprocessor systems of 8 to 32 bits are obtained and compared by I/O programs. The compared result showed that execution time related to the instruction cycles of 8 bit 8051 was longer than that of 8 bit 8051 and of 16 bit 8086 by a lot of number of clocks in cases of clock frequencies at 4 MHz and at 12 MHz. In cases of really many using
clock frequencies, it showed that execution times of instructions have become faster by the order of 8085, 8086, 8051 and 80386. It can be helped to interface with
for real time control through comparing with execution times of I/O programs by mainly many usable Intel series
in our nation.
An Improved Feature Extraction Technique of Asterias Amurensis using 6-Directional Scanning and Centers of Region
Shin, Hyun-Deok ; Chu, Ran-Heui ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 67~75
DOI : 10.7236/JIIBC.2013.13.2.67
Korea has developed coastal farming industry due to the environmental characteristics that its three sides are surrounded by sea. The damage of coastal farming industry caused by Asterias Amurensis with very strong reproductive rate and predaciousness has increased sharply every year. Moreover, Asterias Amurensis preys on living fish and shellfish and so the damage of fishermen is vern greater. In this paper, a method is proposed to extract effectively the features from the image of Asterias Amurensis acquired in the water. Because the proposed method extracts convex features using 6-directional scanning, it selects a fewer number of feature candidates than the conventional one. In addition, after selecting candidate concave points using the extracted convex features and centers of region, the final concave features are extracted. Due to the features of the starfish which lives in groups, individuals of the starfish in the input image are concentrated. Thus, it is significant to minimize the number of feature candidates extracted from the input image. The experimental results indicate an improvement of the proposed feature extraction method over the conventional one as evidenced by the fact that the feature extract was 88 % of the feature candidates.
Implementation of Verification and Evaluation Testbed of WiMax2 PKMv2 Encryption Layer
Kim, Jang-Hyun ; Suh, Hyo-Joong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 77~82
DOI : 10.7236/JIIBC.2013.13.2.77
PKMv2 security protocol was adopted by the WiMax2 mobile internet communication standard. A base station and a mobile station protect communication data using key based encryption according to the PKMv2 protocol. Consequently, each development of a base station and/or mobile station includes implement of the PKMv2 protocol, and the station must qualifies various interoperable tests. Furthermore, communication bandwidth of the station can be limited by the encryption module when the station implemented based on a low-performance processor. Thus, a correspondence measurement of the encryption module must be carried on the target processor. In this paper, we implement a testbed which affords throughput measurement as well as the interoperable tests by PKMv2.
Design Technology of Product Line Architecture for Software Globalization
Lee, Kwanwoo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 83~92
DOI : 10.7236/JIIBC.2013.13.2.83
Software globalization is the supporting process of adapting computer software to different country and culture. Most efforts for software globalization have been focused on the development of software implementation techniques or tools. However, global software sold worldwide has different requirements implied by different contexts, and the difference of requirements may derive different architectural design. In this paper, we define such architectural design knowledge as knowledge models and propose a method for developing and using the knowledge models for software globalization. Also we use set-top box middleware systems for digital data broadcast to validate the applicability of the proposed models and methods.
Optimal Solution for Transportation Problems
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 93~102
DOI : 10.7236/JIIBC.2013.13.2.93
This paper proposes an algorithm designed to obtain the optimal solution for transportation problem. The transportation problem could be classified into balanced transportation where supply meets demand, and unbalanced transportation where supply and demand do not converge. The archetypal TSM (Transportation Simplex Method) for this optimal solution firstly converts the unbalanced problem into the balanced problem by adding dummy columns or rows. Then it obtains an initial solution through employment of various methods, including NCM, LCM, VAM, etc. Lastly, it verifies whether or not the initial solution is optimal by employing MODI. The abovementioned algorithm therefore carries out a handful of complicated steps to acquire the optimal solution. The proposed algorithm, on the other hand, skips the conversion stage for unbalanced transportation problem. It does not verify initial solution, either. The suggested algorithm firstly allocates resources so that supply meets demand, in the descending order of its loss cost. Secondly, it optimizes any surplus quantity (the amount by which the initially allocated quantity exceeds demand) in such a way that the loss cost could be minimized Once the above reallocation is terminated, an additional arrangement is carried out by transferring the allocated quantity in columns with the maximum cost to the rows with the minimum transportation cost. Upon application to 2 unbalanced transportation data and 13 balanced transportation data, the proposed algorithm has successfully obtained the optimal solution. Additionally, it generated the optimal solution for 4 data, whose solution the existing methods have failed to obtain. Consequently, the suggested algorithm could be universally applied to the transportation problem.
An Efficient Implementation of Kruskal`s and Reverse-Delete Minimum Spanning Tree Algorithm
Choi, Myeong-Bok ; Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 103~114
DOI : 10.7236/JIIBC.2013.13.2.103
This paper suggests a method to reduce the number of performances of Kruskal and Reverse-delete algorithms. Present Kruskal and Reverse-delete algorithms verify whether the cycle occurs within the edges of the graph. For this reason, they have problems of unnecessarily performing extra algorithms from the edges, even though they`ve already obtained the minimum spanning tree. This paper, first of all, suggests the 1st method which reduces the no. of performances by introducing stop point criteria of algorithm, but at the same time, performs algorithms from all the edges, just like how Kruskal and Reverse-delete algorithms. Next, it suggests the 2nd method which finds the minimum spanning tree from the remaining edges after getting rid of all the unnecessary edges which are considered not to affect the minimum spanning tree. These suggested methods have an effect of terminating algorithm at least 1.4 times and at most 3.86times than Kruskal and Reverse-delete algorithms, when applied to the real graphs. We have found that the 2nd method of the Reverse-delete algorithm has the fastest speed in terminating an algorithm, among 4 algorithms which are results of the 2 suggested methods being applied to 2 algorithms.
A Study of Android Launcher based on Application Virtualization
Lim, Seung-Cheol ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 115~120
DOI : 10.7236/JIIBC.2013.13.2.115
Recently, Virtualization technology is moving the desktop environment from its place a mobile platform environment, personal and businesses, academia, and lacked security and in a team environment brought about many changes are coming. In this environment, a representative of VMware`s MVP solution and Enterporid Divide. But, another issue is that these mobile virtualization technologies in an environment of limited resources and performance constraints, have become its application virtualization technology to improve the weaknesses of the mobile platform. In this paper, proposed for client-based desktop application virtualization infrastructure, bring it to the Android environment, weaknesses of the existing paper was user area limitations of the desktop environment with application virtualization, program execution android application virtualization launcher was improved through increased resource allocation.
Analysis of Electromagnetic Wave for Spark Plug Cable in Distributorless Spark Ignition System
Kang, Sang-Won ; Choe, Gwang-Je ; Hur, Jung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 121~125
DOI : 10.7236/JIIBC.2013.13.2.121
It is an analysis about electromagnetic wave which is generated from a Spark plug cable of Distributorless spark ignition system. In case of Distributorless spark ignition system, high frequency generation is an ignition coil and Spark plug cable and Spark plug could be activated with electromagnetic wave radiation antenna. I calculated a resonant frequency with HFSS by measuring length of Spark plug cable and Spark plug. The antenna was considered as
monopole antenna in this calculation. According to power spectrum measurement analysis of engine room radiated electromagnetic wave and calculated Resonant frequency, it is possible to find out that the Distributorless spark ignition system radiates high frequency energy in certain frequency band.
A Study on the Automated Compatibility Standard Test System for eBook DRM
Kim, Tae-Hyun ; Kang, Ho-Gap ; Ahn, Chang-Ju ; Cho, Seong-Hwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 127~136
DOI : 10.7236/JIIBC.2013.13.2.127
The study of the compatibility of EPUB DRM, granted by the Korea Copyright Commission, as a CT R & D project (Project Title: The Development of the standard reference software technology for International Standard EPUB-based eBook DRM) developed standards such as profile standards for encryption digital signature and authentication certificates and standards for technical terms of rights information. In 2012, these four standards have been established as the Korean Industrial Standards under the names of `Encryption specification for EPUB DRM,` `the Digital signature specification for EPUB DRM,` `the Certificate specification for EPUB DRM,` and `Definitions of Right Terms for EPUB DRM` through the ODPF(Open Digital Standardization Forum) and the TTA(Telecommunications Technology Association). The research project also proposed standards of ebook DRM license protocols in order for the four standards to practically apply to ebook DRM compatibility. It is necessary for technology standards to require a compatibility standard test process for testing whether implementations which were developed on the basis of the standard specification, comply with standards. This study suggests an automated compatible standard test method and a test model under the ebook DRM standard technical specification.
A Study on Target Incident Signal Estimaion Technique of spatial Spectrum in Wireless Network System
Lee, Kwan-Hyeong ; Song, Woo-Young ; Lee, Myeong-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 137~142
DOI : 10.7236/JIIBC.2013.13.2.137
Direction of arrival is estimating for desire signal direction among received signal on antenna in spatial. In this paper, we were an estimation a receiving signal direction of arrival using multi beam forming in radar. We proposed, by signal direction of arrival estimation method, an algorithm which combine spatial correlation matrix weight value and beam steering algorithm in this paper. Through simulation, we were analysis a performance to compare general algorithm and proposal algorithm. In direction of arrival estimation, proposed algorithm is effectivity to decrease processing time because it is not doing an eigen decomposition. We showed that proposal algorithm improve more target estimation than general algorithm.
A Study on Multi Beam Steering using Weight Error Compensation Algorithm and SVD in Wireless System
Lee, Kwan-Hyeong ; Song, Woo-Young ; Lee, Myeong-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 143~148
DOI : 10.7236/JIIBC.2013.13.2.143
This paper study about multi-beam for ditection of arrival estimation in wireless system. estimate a direction of arrival of target in multi input-output array antennas system. Beam steering method are divided by beam steering method of elevation angle or beam forming method, stack beam steering, frequency steering, phase steering radar and digital beam forming radar. Proposed algorithm is combined SVD method and antenna weight error compensation method with phase and amplitude compensation to effectivity beam steering. Through simulation, we were analysis of performance that general algorithm and proposed target estimation algorithm in this paper. It was proved to improved proposal algorithm than general algorithm in target direction of arrival estimation.
ERX : A Generation Tool of XML Schema based on Entity-Relationship Model
Kim, Young-Ung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 149~155
DOI : 10.7236/JIIBC.2013.13.2.149
In these days, Entity-Relationship Model is the most popular modeling tool for designing databases, and XML is a de facto standard language for representing and exchanging data. But, because of many commercial products supporting Entity-Relationship Model use their`s own representation formats, and thus it gives rise to difficulties the inter-operability between these products. In this paper, we propose an ERX, a generation tool of XML Schema from Entity-Relationship Model. ERX receives an Entity-Relationship Diagram as an input, transforms it based on transformation rules, and generates a XML Schema Definition as an output. Transformation rules contain entity set, relationship set, mapping cardinalities, and generalization.
Performance Improvement of Human Detection in Thermal Images using Principal Component Analysis and Blob Clustering
Jo, Ahra ; Park, Jeong-Sik ; Seo, Yong-Ho ; Jang, Gil-Jin ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 157~163
DOI : 10.7236/JIIBC.2013.13.2.157
In this paper, we propose a human detection technique using thermal imaging camera. The proposed method is useful at night or rainy weather where a visible light imaging cameras is not able to detect human activities. Under the observation that a human is usually brighter than the background in the thermal images, we estimate the preliminary human regions using the statistical confidence measures in the gray-level, brightness histogram. Afterwards, we applied Gaussian filtering and blob labeling techniques to remove the unwanted noise, and gather the scattered of the pixel distributions and the center of gravities of the blobs. In the final step, we exploit the aspect ratio and the area on the unified object region as well as a number of the principal components extracted from the object region images to determine if the detected object is a human. The experimental results show that the proposed method is effective in environments where visible light cameras are not applicable.
Authoring Tool for Robot Simulation Creation using Functional Concise Script
Kim, Young-Joon ; Seo, Yong-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 165~170
DOI : 10.7236/JIIBC.2013.13.2.165
This paper proposes a method of simplification for robot simulation creation using functional concise script. General robotics simulation authoring tools require professional knowledge regarding development language and their APIs, and these prerequisites are considered as a big obstacle in implementing robotics simulation. In order to resolve these problems, we developed an authoring tool using functional concise script in building simulation environment, and this concise script composes of simplified service commands and minimum options. In experiment, we educated students and teachers in High school to use this authoring tool and we verified that the proposed method makes it possible to build robotics simulation environment and control simulated robots through one-day training course for the novices.
Performance Improvement of Eye Tracking System using Reinforcement Learning
Shin, Hak-Chul ; Shen, Yan ; Khim, Sarang ; Sung, WonJun ; Ahmed, Minhaz Uddin ; Hong, Yo-Hoon ; Rhee, Phill-Kyu ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 171~179
DOI : 10.7236/JIIBC.2013.13.2.171
Recognition and image processing technology depends on illumination variation. One of the most important factors is the parameters of algorithms. When it comes to select these values, the system has different types of recognition accuracy. In this paper, we propose performance improvement of the eye tracking system that depends on some environments such as, people, location, and illumination. Optimized threshold parameter was decided by using reinforcement learning. When the system accuracy goes down, reinforcement learning used to train the value of parameters. According to the experimental results, the performance of eye tracking system can be improved from 3% to 14% by using reinforcement learning. The improved eye tracking system can be effectively used for human-computer interaction.
Design of Optimized Pattern Recognizer by Means of Fuzzy Neural Networks Based on Individual Input Space
Park, Keon-Jun ; Kim, Yong-Kab ; Kim, Byun-Gon ; Hoang, Geun-Chang ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 181~189
DOI : 10.7236/JIIBC.2013.13.2.181
In this paper, we introduce the fuzzy neural network based on the individual input space to design the pattern recognizer. The proposed networks configure the network by individually dividing each input space. The premise part of the networks is independently composed of the fuzzy partition of individual input spaces and the consequence part of the networks is represented by polynomial functions. The learning of fuzzy neural networks is realized by adjusting connection weights of the neurons in the consequent part of the fuzzy rules and it follows a back-propagation algorithm. In addition, in order to optimize the parameters of the proposed network, we use real-coded genetic algorithms. Finally, we design the optimized pattern recognizer using the experimental data for pattern recognition.
Curriculum Development of Acoustics and Audio Engineering on Digital Convergence Environment
Oh, Wongeun ; Rhee, Esther ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 191~197
DOI : 10.7236/JIIBC.2013.13.2.191
In this paper, we present the college curriculum for the acoustics and audio engineering on digital convergence environment. For these purposes, we categorized the colleges which linked on the ASA and AES websites into three types according to their characteristics such as an acoustics-oriented type, an applied-acoustics type, and a convergence-oriented type. And a basic step-by-step curriculum model for the audio acoustics is suggested based on the characteristics of the category analysis. The proposed model can be effectively used to build an acoustics and audio technology course at the domestic colleges.
Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot
Kim, Soeui ; Choi, Duri ; An, Beongku ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 199~207
DOI : 10.7236/JIIBC.2013.13.2.199
Recently, hacking is seen as a criminal activity beyond an activity associated with curiosity in the beginning. The malignant bot which is used as an attack technique is one of the examples. Malignant Bot is one of IRC Bots and it leaks user`s information with attacker`s command by attacking specified IP range. This paper will discuss an access method and a movement process by analyzing shadowbot which is a kind of a malignant Bot and will suggest possible countermeasure. This study has two distinct features. First, we analyze malignant Bot by analyzing tools such as VM ware. Second, we formulate a hypothesis and will suggest possible countermeasure through analyzing malignant Bot`s access method and movement. Performance evaluation will be conducted by applying possible countermeasure to see if it can prevent attacks from malignant bot.
Android Based Mobile Student Identity Card
Choi, Sungjik ; Kim, Minji ; Han, Jeungwook ; An, Beongku ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 209~215
DOI : 10.7236/JIIBC.2013.13.2.209
Currently Plastic Student Identity Card has not been used frequently because it is inconvenient to possess. In this paper, we propose and develope Mobile Student Identity Card(MSIC) which consists of combination of smart phone and student identity card to support convenient campus life for students in school. The main features of the developed MSIC are as follows. First, it can confirm student identity and offer MSIC to each students by using Database. Second, it can support convenient campus life for students by adequate layout. In the performance evaluation, we use development kit based on Android and AVD(Android Virture Device) for simulation.
Planning of Barrier Free Pedestrian Safety Devices
Nam, Doohee ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 217~223
DOI : 10.7236/JIIBC.2013.13.2.217
Population aging is a shift in the distribution of a country`s population towards older ages. This is usually reflected in an increase in the population`s mean and median ages, a decline in the proportion of the population composed of children, and a rise in the proportion of the population that is elderly. Population ageing is widespread across the world. Barrier-free or Design for All concept consists of modifying buildings or facilities so that they can be used by people who are disabled or have physical impairments. Design for All criteria are aimed at ensuring that everyone can participate in the Information society. Safety-related products being easy to adapt according to different needs, or using standardized interfaces that can be accessed simply by using assistive technology. To this end, policy makers and service providers, especially in the ubiquitous technologies, produce new technologies, products, services and applications for pedestrians.
Bird`s-Eye View Service under Ubiquitous Transportation Sensor Network Environments
Kim, Joohwan ; Nam, Doohee ; Baek, Sungjoon ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 225~231
DOI : 10.7236/JIIBC.2013.13.2.225
A bird`s-eye view is an elevated view of an object from above, with a perspective as though the observer were a bird, often used in the making of blueprints, floor plans and maps. It can be used under severe weather conditions when visibility is poor. Under low visibility environments, drivers can communicate each other using V2V communication to get each vehicle`s status to prevent collision and other accidents. Ubiquitous transportation sensor networks(u-TSN) and its application are emerging rapidly as an exciting new paradigm to provide reliable and comfortable transportatione services. The ever-growing u-TSN and its application will provide an intelligent and ubiquitous communication and network technology for traffic safety area.
Recognition Model of Road Signs Using Image Segmentation Algorithm
Huang, Ying ; Song, Jeong-Young ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 233~237
DOI : 10.7236/JIIBC.2013.13.2.233
Image recognition is an important research area of pattern recognition. This paper studies that the image segmentation algorithm theory and its application in road signs recognition system. In this paper We studied a systematic study for road signs and we have made the recognition algorithm. This paper is divided in image segmentation part and image recognition part for the road signs recognition. The experimental results show that the road signs recognition model can make effective use in smart phone system, and the model can be used in many other fields.
Implementation of Ubiquitous-Based Construction Site Management System
Yeon, Sang-Ho ; Lee, Young-Wook ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 239~244
DOI : 10.7236/JIIBC.2013.13.2.239
A ubiquitous-based construction site management system coupled with construction processing status of a 3-D spatial information and sensor network for construction site management is implemented. The service of such management system is able to save efforts and times to check the processing status of construction sites and more the related construction staff in charge can receive the real time information of construction field or the related information can be transmitted to the office where the construction staffs in charge are. Especially we can provide on a mobile smart phone of real time processing status at construction field and environmental information of such temperature, humidity, information of GPS, etc. which are able to affect the construction status. In addition, construction processing and design modification etc. as well as necessary informations are able to be helped and provided at any time and to any place.
Implementation of Intelligence Pulse Wave Detection System
Hong, Y.S. ; Yu, J.S. ; Chang, S.J. ; Sun, S.H. ; Lee, W.B. ; Nam, D.H. ; Yu, M.S. ; Choi, M.B. ; Lee, S.S. ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 245~254
DOI : 10.7236/JIIBC.2013.13.2.245
In oriental medicine, it is possible to classify and treat many diseases using the pulse wave detection system. Other problems may arise. As it is a very subjective way to analyze the pulse wave. One problem of the conventional pulse wave detection system is that the arterial pulse sensor is not located correctly at the radial artery. Threrefore measurement results can differ depending on the measurement position and the measurement procedure. This is mostly due to it`s sensitivity to high reproducibility. In order to solve this problem this paper proposes an algorithm to analyze the weak pulse wave symptom and strong pulse wave symptom. It uses the portable pulse wave detection system which includes a Hall Sensor. As a final result, it analyzed the weak pulse wave symptom and strong pulse wave symptom by the SPSS statistics technique. It proves that N time (notch point time) and S Amp (rise waveform size) mean values are significantly different in 95% confidence interval.
Smart Education System
Hong, You-Sik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 255~260
DOI : 10.7236/JIIBC.2013.13.2.255
Nowadays, the intelligent education system has been studied using the self-directed learning ability. It can connect to the online virtual university and it is based on web technology that can be accessed anywhere anyplace. In order to implement the intelligent tutoring system, the student`s weak and strong subjects must be first determined in real time, it proposed level learning capabilities and security algorithms in this paper. Moreover, in this paper, to implement the intelligent education tutoring system it proposed qr code and student level learning simulation.
A Study on Effective Information Transfer Technique between Personal Computer and Portable Equipment
Choi, Gyoo-Seok ; Park, Jong-Jin ; Kang, Jung-Jin ; Kim, Woong Jae ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 261~267
DOI : 10.7236/JIIBC.2013.13.2.261
In this paper, the effective information transfer technique between computing device and portable device that is connected through USB interface has been studied. The proposed technique is realized by the method which portable device is perceived into optical media such as CD-ROM or CD-R/W through SCSI commands on USB interface. Through the proposed system in this study, we maximized user convenience by executing diverse works using stored data in a portable device without installing extra USB driver corresponding to portable device, when user data is transmitted between computing device and portable device. We conducted experimental tests to verify the performance of the proposed system through implementing of test system. As a result, we confirmed the technique is comparatively superior to existing method in transmitting speed and user convenience.
Potential Interference of Electric Equipments on Radio Service below 30MHz
Yun, Hye-Ju ; Lee, Il-Kyoo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 269~273
DOI : 10.7236/JIIBC.2013.13.2.269
This paper analyzed a potential interference of electric equipments on radio service below 30MHz through an experiment with a PDP(Plasma Display Panel) TV and a RF(Radio Frequency) light bulb in an anechoic chamber. The radiation levels of the PDP TV and the RF light bulb are measured and a combined interference is calculated on the basis of the experimental value. As a result, the combined interference signal level is increased according to the number of interferer. The possibility of a potential interference from electric equipments on radio service below 30MHz is realized through comparison between the measured radiation value of electric equipments and the CISPR(International Special Committee on Radio Interference) 11 limit.
A Study on PON-based Mobile Backhaul Using Network Coding
Jung, Bokrae ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 13, issue 2, 2013, Pages 275~280
DOI : 10.7236/JIIBC.2013.13.2.275
With rapidly growing mobile wireless services, the existing copper-based mobile backhaul technologies suffer from reaching the capacity limits. PON technologies is drawing attention as a key solution to replace the existing mobile backhaul technologies due to not only providing innovative network capacity but also cost-effective maintenance caused by the bandwidth gain from optical fibers. With a PON-based mobile backhaul, broadband wireless multimedia services such as a video conference and IPTV can be seamlessly provided. In this paper, we first introduce overview of the PON-based mobile backhaul technology. For a example of practical integration, three types of EPON-WiMAX integrated architectures are proposed and comparatively analyzed in term of costs and network performance. Then, applicable plan and anticipated effects are presented when applying network coding on the PON-based mobile backhaul to improve the performance of delivering multicast traffic.