Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of The Institute of Internet, Broadcasting and Communication
Journal Basic Information
Journal DOI :
The institute Of Webcasting, Internet And Telecommunication
Editor in Chief :
Volume & Issues
Volume 14, Issue 6 - Dec 2014
Volume 14, Issue 5 - Oct 2014
Volume 14, Issue 4 - Aug 2014
Volume 14, Issue 3 - Jun 2014
Volume 14, Issue 2 - Apr 2014
Volume 14, Issue 1 - Feb 2014
Selecting the target year
North Korean Cyber Warfare Threat and South Korean Action
Kim, Doo-Hyun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 1~10
DOI : 10.7236/JIIBC.2014.14.2.1
In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea's cyber warfare threat which is equipped with world's top 3 cyber warfare performance and the way how their strategy influence to South Korea's national security. Moreever, I studied the existing North Korea's cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.
Data Hiding Based on BTC using EMD
Kim, Cheonshik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 11~16
DOI : 10.7236/JIIBC.2014.14.2.11
Block truncation coding (BTC) is a recent technique used for compression of monochrome image data. The original algorithm of BTC implement to use the standard mean and the standard deviation. For data hiding, it is needed to modify bit-planes of an images. These modifications yields unacceptable quality of BTC images. Thus, we propose IODBTC (Improved Ordered dithering BTC) improving BTC. In this paper, we improve this problem. Experimental results show that the reconstructed secret messages are the same as the original secret messages, and that the proposed scheme exhibits a good BTC images compared to that of previous schemes.
Improvement of DCT-based Watermarking Scheme using Quantized Coefficients of Image
Im, Yong-Soon ; Kang, Eun-Young ; Park, Jae-Pyo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 17~22
DOI : 10.7236/JIIBC.2014.14.2.17
Watermarking is one of the methods that insist on a copyright as it append digital signals in digital informations like still mobile image, video, other informations. This paper proposed an improved DCT-based watermarking scheme using quantized coefficients of image. This process makes quantized coefficients through a Discrete Cosine Transform and Quantization. The watermark is embedded into the quantization coefficients in accordance with location(key). The quantized watermarked coefficients are converted to watermarked image through the inverse quantization and inverse DCT. Watermark extract process only use watermarked image and location(key). In watermark extract process, quantized coefficients is obtained from watermarked image through a DCT and quantization process. The quantized coefficients select coefficients using location(key). We perform it using inverse DCT and get the watermark'. Simulation results are satisfied with high quality of image (PSNR) and Normalized Correlation(NC) from the watermarked image and the extracted watermark.
Life Cycle Model of Over lapped-Concur rent Software
Choi, Myeong-Bok ; Han, Tae-Yong ; Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 23~34
DOI : 10.7236/JIIBC.2014.14.2.23
Though a dozen of different software life cycle models are suggested, there is no universal model which can satisfy all the characteristics of software. Organizations mix and match different life cycle models to develop a model more tailored for their systems and capabilities. We suggest overlapped-concurrent development life cycle model that is more suitable in various software development environment. Firstly, we divided the development process into abstract and implementation stage. Abstract stage is from software concept phase to detailed design starting time, and implementation stage is from detailed design phase to system testing phase. Next, the abstract stage introduced the overlapped phase concept that begins the next phase when the step is completed 20% by applying pareto's law. In the implementation stage, we introduced the concurrent development which the several phases are performed some time as when one use-case (UC) is completed the next development phase is started immediately. The proposed model has an advantage that it can reduce the inefficiency of development resource greatly. This model can increase the customer satisfaction with a great product at a low cost and on a short schedule. Also, this model can contribute to increase the software development success rate.
Minimum Spanning Tree Algorithm for Deletion of Maximum Weight Edge within a Cycle
Choi, Myeong-Bok ; Han, Tae-Yong ; Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 35~42
DOI : 10.7236/JIIBC.2014.14.2.35
This paper suggests a method that obtains the minimum spanning tree (MST) far more easily and rapidly than the present ones. The suggested algorithm, firstly, simplifies a graph by means of reducing the number of edges of the graph. To achieve this, it applies a method of eliminating the maximum weight edge if the valency of vertices of the graph is equal to or more than 3. As a result of this step, we can obtain the reduced edge population. Next, it applies a method in which the maximum weight edge is eliminated within the cycle. On applying the suggested population minimizing and maximum weight edge deletion algorithms to 9 various graphs, as many as the number of cycles of the graph is executed and MST is easily obtained. It turns out to lessen 66% of the number of cycles and obtain the MST in at least 2 and at most 8 cycles by only deleting the maximum weight edges.
H.264 Encoding Technique of Multi-view Video expressed by Layered Depth Image
Shin, Jong-Hong ; Jee, Inn-Ho ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 43~51
DOI : 10.7236/JIIBC.2014.14.2.43
Multi-view video including depth image is necessary to develop a new compression encoding technique for storage and transmission, because of a huge amount of data. Layered depth image is an efficient representation method of multi-view video data. This method makes a data structure that is synthesis of multi-view color and depth image. This efficient method to compress new contents is suggested to use layered depth image representation and to apply for video compression encoding by using 3D warping. This paper proposed enhanced compression method using layered depth image representation and H.264/AVC video coding technology. In experimental results, we confirmed high compression performance and good quality of reconstructed image.
Design and Implementation of a FlexRay-CAN gateway for Real-Time Control
Park, JeongHoon ; Moon, Chan-Woo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 53~58
DOI : 10.7236/JIIBC.2014.14.2.53
As the amount of data between ECUs has increased, the FlexRay consortium proposed FlexRay network system which has larger bandwidth than CAN. But because of implementation cost, CAN and FlexRay hybrid network with FlexRay-CAN gateway will make up the largest part of in-vehicle networks for the present. In this paper, a FlexRay-CAN gateway for a real time feedback control system is implemented, and a data packing algorithm is presented. Finally, a real control experiment with multi-motor system is conducted to verify the proposed gateway system.
A study on WiMAX Backhaul in Mobile Communication Network
Park, Chun-Kwan ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 59~64
DOI : 10.7236/JIIBC.2014.14.2.59
This paper address the scheme for WiMAX backhaul in mobile communication network. These days most ISPs has implemented Wi-Fi backhaul using T1/E1 and DSL. if WiMAX is installed as the alternative to the mobile backhaul, it can decrease the costs drastically for the installation and operations. And it will be one of the best cost-effective solutions to cover the service areas which has not the wired communication infrastructure. WiMAX can be used for Base station, Subscriber Station, and Relay. In this paper, the performance is measured for downstream and upstream using NAT and port forwarding functions by configuring WiMAX server and WiMAX SS.
Multi-Modal User Distance Estimation System based on Mobile Device
Oh, Byung-Hun ; Hong, Kwang-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 65~71
DOI : 10.7236/JIIBC.2014.14.2.65
This paper present the multi-modal user distance estimation system using mono camera and mono microphone basically equipped with a mobile device. In case of a distance estimation method using an image, we is estimated a distance of the user through the skin color region extraction step, a noise removal step, the face and eyes region detection step. On the other hand, in case of a distance estimation method using speech, we calculates the absolute difference between the value of the sample of speech input. The largest peak value of the calculated difference value is selected and samples before and after the peak are specified as the ROI(Region of Interest). The samples specified perform FFT(Fast Fourier Transform) and calculate the magnitude of the frequency domain. Magnitude obtained is compared with the distance model to calculate the likelihood. We is estimated user distance by adding with weights in the sorted value. The result of an experiment using the multi-modal method shows more improved measurement value than that of single modality.
Performance comparison of MIMO-VLC systems according to the change of an emission angle
Lee, Byung-Jin ; Kim, Yong-Won ; Kim, Young-Keun ; Kim, Kyung-Seok ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 73~79
DOI : 10.7236/JIIBC.2014.14.2.73
Visible light communication is a communication method using an LED having a high-speed ON / OFF rate data to be transmitted, it is used as a wireless high speed data transmission. VLC system evolves, the problem of basic research is intended to improve performance and ensure reliability of the communication. The nature of the visible light communication, communication is performed only in the reach of the light, which indicates a big difference by the emission angle of the light. Therefore, in this paper, in the case of indoor environments generally, with the attributes of the multiple LED is equipped, was applied to a MIMO (Multiple Input Multiple Output) communication system. and analyzed SNR performance and total power can be obtained on the reception side by changing the emission angle of the transmitter. As a result of the simulation was run against this, it was confirmed that there is a significant impact on the performance of BER and SNR performance by the emission angle of the transmitter.
Research on Efficiency of Interest-Data Handshaking in Wireless Content-Centric Networks
Lee, Seung-Jin ; Park, Chan-Min ; Kim, Byung-Seo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 81~86
DOI : 10.7236/JIIBC.2014.14.2.81
Content Centric Network (CCN) is one of candidate technologies for the future Information Centric Networks. Recently, adopting CCN concept to wireless networks has extensively been studied. One of the well-known studies is Enhanced-Content-centric multiHop wireless NETwork (E-CHANET), which proposes efficient methods to deliver contents adopting CCN concept over wireless environment. In E-CHANET, in order for a provider to send a data packet, one interest packet from a consumer is required. In this paper, efficiency of data-interest handshaking in E-CHANET has been investigated. It is compared with a method using only one interest packet for all data packets through simulations. As results, while the handshaking provides transmission reliability, it increses content down load time too much.
Application Study applied to the Encryption at Virtualization Launcher
Lim, Seung-Cheol ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 87~92
DOI : 10.7236/JIIBC.2014.14.2.87
Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.
Throughput Analysis Based on Collision Probability in 802.11 Networks
Jin, Hyun-Joon ; Song, Myong-Lyol ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 93~100
DOI : 10.7236/JIIBC.2014.14.2.93
IEEE 802.11 Wireless LAN Medium Access Control(MAC) supports two transmission methods, a DCF basic and a RTS/CTS in contention-based access. Even though the RTS/CTS method has been optionally introduced to solve the hidden terminal problem, it is able to produce better performance in some network environments than the basic transmission method. In this paper, the collision probability of wireless channel is mathematically analyzed and applied to measure network throughput using real transmission parameters so that a reference value between throughputs of two methods is obtained. We also confirmed that control signal rates affect overall network throughput and evaluated network throughputs considering collision probability, number of stations, and contention window size of Backoff between two methods respectively.
Web Service for Traffic Information Using Focus+Context Visualization Technique
Kim, Kwangseob ; Nam, Doohee ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 101~106
DOI : 10.7236/JIIBC.2014.14.2.101
Information and Communication Technology environment has been developing rapidly and variety of services are in service. As data becomes increasingly sophisticated. These data was applied techniques of visualization in order to visualize efficiently. Various agencies are providing the map based data in real-time. However, traffic information is getting more complex and users are having a difficulty to understand with convential visualization techniques. This study was designed and implemented in the web service of traffic information using Focus+Context. Web service implemented HTML5(Hyper Text Markup Language 5), and it runs on browser of either desktop or mobile devices. This study sets an example as web application from a user perspective by combining information visualization and traffic information.
Uncertainty Measurement of Incomplete Information System based on Conditional Information Entropy
Park, Inkyoo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 107~113
DOI : 10.7236/JIIBC.2014.14.2.107
The derivation of optimal information from decision table is based on the concept of indiscernibility relation and approximation space in rough set. Because decision table is more likely to be susceptible to the superposition or inconsistency in decision table, the reduction of attributes is a important concept in knowledge representation. While complete subsets of the attribute's domain is considered in algebraic definition, incomplete subsets of the attribute's domain is considered in information-theoretic definition. Therefore there is a marked difference between algebraic and information-theoretic definition. This paper proposes a conditional entropy using rough set as information theoretical measures in order to deduct the optimal information which may contain condition attributes and decision attribute of information system and shows its effectiveness.
A Method for Deriving an Optimal Product Feature Configuration Considering Feature Interaction
Lee, Kwanwoo ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 115~120
DOI : 10.7236/JIIBC.2014.14.2.115
Many product line engineering methods use the feature model to structure commonality and variability among products in terms of features and to derive a product feature configuration, which is the set of features required for the development of a product. Features to be selected during product derivation are mainly determined based on the quality attributes required for a product. Most methods published so far derived an optimal product feature configuration through linear co-relationship between features and quality attributes. However, the co-relationship between features and quality attributes can be formulated as a non-linear function because of feature interactions. This paper proposes a method that derives an optimal product feature configuration considering feature interactions. Four product line cases are used to validate the proposed methods.
Shift-and-Add Multiplication Algorithm for Decimal System
Lee, Sang-Un ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 121~126
DOI : 10.7236/JIIBC.2014.14.2.121
The problem of finding the fastest algorithm for multiplication of two large n-digit decimal numbers remains unsolved in the field of mathematics and computer science. To this problem so far two algorithms - Karatsuba and Toom-kook - have been proposed to shorten the number of multiplication. In the complete opposite of shorten the number of multiplication method, this paper therefore proposes an efficient multiplication algorithm using additions completely. The proposed algorithm totally applies shift-and-add algorithm of binary system to large digits of decimal number multiplication for example of RSA-100 this problem can't perform using computer. This algorithm performs multiplication purely with additions of complexity of
A Study on Radiation Char acter istics of Electr ically Small Antenna for Low-VHF Band Direction Finding according to Tank Mounting Position
Moon, Sang-Man ; Woo, Jong-Myung ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 127~134
DOI : 10.7236/JIIBC.2014.14.2.127
This paper presents a study on the radiation characteristics of low-VHF band electrically small antenna for direction finding. Firstly, it is simulated the antenna for mounting on flat ground and tank model(in 40MHz), and measured for mounting 1/10 scaled model(in 400 MHz). In case of flat ground feed at
(H-plane) and xz-plane
(E-plane) radiation patterns are hemispheric omni-direction due to effect of narrow ground side. Then, in case of tank model, it is shown equally in case of the flat ground, yz-plane
(H-plane) and xz-plane
(E-plane) radiation patterns are hemispheric omni-direction nearly without effect of mounting position. Therefore, the suggested electrically small antenna for direction finding, in case of mounting on ground narrow side xz-plane(E-plane), is shown more stable radiation patterns as direction finding antenna.
Circuit Design and Implementation for Noise Enhancement of Optical Mouse
Park, Sang-Bong ; Heo, Jeong-Hwa ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 135~140
DOI : 10.7236/JIIBC.2014.14.2.135
In this paper, we describe the contents of noise characteristic enhancement using digital filtering to the motion vector in the pattern noise of optical mouse. The designed circuit is implemented to enhance the smoothing and trembling with filtering and averaging of x, y motion vector before PS2 or USB output. The function is verified by using FPGA and the performance is measured by the fabricated chip using
standard CMOS process. The system clock is 6MHz and the motion vector has the range of +6 to -6 per 1/1700sec. It is tested using the Cartesian robot to measure the noise characteristic enhancement.
Implementation and Design of Handwritten Character Recognition Algorithm Using Touch Screen
Park, Sang-Bong ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 141~146
DOI : 10.7236/JIIBC.2014.14.2.141
This paper describes the implementation and algorithm of handwritten character recognition using mobile touch screen. The system is consisted of PXA320 processor, capacitive touch panel and QT4 interface. The proposed algorithm extracts pattern characteristics with straight, left circle, right circle on the inputting character. The definition of character is determined by 3-way tree searching method. The performance of proposed algorithm is verified using alphabet character. It is suitable to apply the mobile touch screen because of simple algorithm.
Static and Dynamic Behavior of Tunable DFB Laser based on Modal Transmission-Line Theory
Ho, Kwang-Chun ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 147~152
DOI : 10.7236/JIIBC.2014.14.2.147
A longitudinal modal transmission-line theory(L-MTLT) to analyze the static and dynamic behavior of two-section distributed feedback (DFB) lasers is used. The characteristic impedance and equivalent propagation constant of DFB structure with active layer are derived from L-MTLT. A two-section DFB laser is analogous to a transmission-line network, in which each section is described by transmission-line block corresponding to the equivalent factors. The longitudinal resonant condition of DFB laser based on equivalent transmission-line network is used to reformulate the rate equations so that static and dynamic behavior of two-section DFB lasers with active layer is demonstrated and analyzed accurately.
Design and Implementation Smart Office System Based on Remote Desktop Protocol (RDP)
Kim, Cheonshik ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 153~159
DOI : 10.7236/JIIBC.2014.14.2.153
For smart work (smart office), RDP(Remote Desktop Protocol) connection is the most popular method. When the office workers do not have personal space, smart office is very useful. That is, they can connect personal computer using Internet at cafe or public spaces. Using the smart office, it is possible to make personal business environment to increase business efficiency. In this paper, we designed and implemented smart office using RDP (Remote Desktop Protocol). We expected that the office workers can be used smart office for business efficiency.
A Study on Digital Broadcast Application for Smart Education, -Focused on Liberal Arts of Humanities
Ko, In-Hwan ; Hong, Bong-Hwa ;
The Journal of The Institute of Internet, Broadcasting and Communication, volume 14, issue 2, 2014, Pages 161~166
DOI : 10.7236/JIIBC.2014.14.2.161
Using and increasing the smart devices got many changes for social environment. Especially, many researchers have studied application using smart devices for improving the learning performance in education. However, Liberal Arts of Humanities has very difficult to apply to information and communication technology cause of traditional study pattern and unit characteristic. In this paper, we suggest a method to apply the Liberal Arts of Humanities to digital broadcasting and to improve learning performance. For this study, we propose a method to making smart contents and connecting them for Liberal Arts of Humanities. And also, we propose a method for applying them to digital broadcasting in order to proof the learning performance increasing by questionary, and shows the application possibility.