Current Issue

  • Regular paper December 31, 2022

    0 86 23

    Dispersion-Managed Link Configured with Repetitively Shaped Dispersion Maps and Embedded with Mid-span Spectral Inversion

    Jae-Pil Chung and Seong-Real Lee , Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 235-241

    Abstract : A dispersion map was proposed to improve the compensation effect of a distorted WDM (wavelength division multiplexed) channel in a dispersion-managed link coupled with optical phase conjugation. The dispersion map is an origin-symmetric structure around the optical phase conjugator in the middle of the transmission path. In addition, the dispersion map has a form in which a constant dispersion accumulation pattern is repeated regularly. Through simulation, we confirmed that the application of the origin-symmetric dispersion map with a repetitively shaped configuration was more effective in compensating for the distorted WDM channel than in the dispersion-managed link with a conventional dispersion map. In addition, we confirmed that the compensation effect could be increased when the cumulative dispersion distribution of the origin-symmetric distribution map had a positive value in the first half section and a negative value in the second half section. Further, we observed that as the number of repeated dispersion accumulation patterns increased, the residual dispersion per span should also be increased.

  • Regular paper December 31, 2022

    0 91 23

    Quantum Computing Cryptography and Lattice Mechanism

    Abbas M. Ali Al-muqarm , Firas Abedi , and Ali S. Abosinnee

    Journal of information and communication convergence engineering 2022; 20(4): 242-249

    Abstract : Classical cryptography with complex computations has recently been utilized in the latest computing systems to create secret keys. However, systems can be breached by fast-measuring methods of the secret key; this approach does not offer adequate protection when depending on the computational complexity alone. The laws of physics for communication purposes are used in quantum computing, enabling new computing concepts to be introduced, particularly in cryptography and key distribution. This paper proposes a quantum computing lattice (CQL) mechanism that applies the BB84 protocol to generate a quantum key. The generated key and a one-time pad encryption method are used to encrypt the message. Then Babai’s algorithm is applied to the ciphertext to find the closet vector problem within the lattice. As a result, quantum computing concepts are used with classical encryption methods to find the closet vector problem in a lattice, providing strength encryption to generate the key. The proposed approach is demonstrated a high calculation speed when using quantum computing.

  • Regular paper December 31, 2022

    0 83 24

    A Cooperative Smart Jamming Attack in Internet of Things Networks

    Ashraf Al Sharah , Hamza Abu Owida , Talal A. Edwan , and Feras Alnaimat

    Journal of information and communication convergence engineering 2022; 20(4): 250-258

    Abstract : The emerging scope of the Internet-of-Things (IoT) has piqued the interest of industry and academia in recent times. Therefore, security becomes the main issue to prevent the possibility of cyberattacks. Jamming attacks are threads that can affect performance and cause significant problems for IoT device. This study explores a smart jamming attack (coalition attack) in which the attackers were previously a part of the legitimate network and are now back to attack it based on the gained knowledge. These attackers regroup into a coalition and begin exchanging information about the legitimate network to launch attacks based on the gained knowledge. Our system enables jammer nodes to select the optimal transmission rates for attacks based on the attack probability table, which contains the most probable link transmission rate between nodes in the legitimate network. The table is updated constantly throughout the life cycle of the coalition. The simulation results show that a coalition of jammers can cause highly successful attacks.

  • Regular paper December 31, 2022

    0 60 16

    Performance Evaluation of k-means and k-medoids in WSN Routing Protocols

    SeaYoung Park , Dai Yeol Yun , Chi-Gon Hwang , and Daesung Lee , Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 259-264

    Abstract : In wireless sensor networks, sensor nodes are often deployed in large numbers in places that are difficult for humans to access. However, the energy of the sensor node is limited. Therefore, one of the most important considerations when designing routing protocols in wireless sensor networks is minimizing the energy consumption of each sensor node. When the energy of a wireless sensor node is exhausted, the node can no longer be used. Various protocols are being designed to minimize energy consumption and maintain long-term network life. Therefore, we proposed KOCED, an optimal cluster K-means algorithm that considers the distances between cluster centers, nodes, and residual energies. I would like to perform a performance evaluation on the KOCED protocol. This is a study for energy efficiency and validation. The purpose of this study is to present performance evaluation factors by comparing the K-means algorithm and the K-medoids algorithm, one of the recently introduced machine learning techniques, with the KOCED protocol.

  • Regular paper December 31, 2022

    0 99 24

    Relational Data Extraction and Transformation: A Study to Enhance Information Systems Performance

    Forat Falih Hasan and Muhamad Shahbani Abu Bakar , Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 265-272

    Abstract : The most effective method to improve information system capabilities is to enable instant access to several relational database sources and transform data with a logical structure into multiple target relational databases. There are numerous data transformation tools available; however, they typically contain fixed procedures that cannot be changed by the user, making it impossible to fulfill the near-real-time data transformation requirements. Furthermore, some tools cannot build object references or alter attribute constraints. There are various situations in which tool changes in data type cause conflicts and difficulties with data quality while transforming between the two systems. The R-programming language was extensively used throughout this study, and several different relational database structures were utilized to complete the proposed study. Experiments showed that the developed study can improve the performance of information systems by interacting with and exchanging data with various relational databases. The study addresses data quality issues, particularly the completeness and integrity dimensions of the data transformation processes.

  • Regular paper December 31, 2022

    0 50 15

    A Study on the Verification of Traffic Flow and Traffic Accident Cognitive Function for Road Traffic Situation Cognitive System

    Am-suk Oh *, Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 273-279

    Abstract : Owing to the need to establish a cooperative-intelligent transport system (C-ITS) environment in the transportation sector locally and abroad, various research and development efforts such as high-tech road infrastructure, connection technology between road components, and traffic information systems are currently underway. However, the current central control center-oriented information collection and provision service structure and the insufficient road infrastructure limit the realization of the C-ITS, which requires a diversity of traffic information, real-time data, advanced traffic safety management, and transportation convenience services. In this study, a network construction method based on the existing received signal strength indicator (RSSI) selected as a comparison target, and the experimental target and the proposed intelligent edge network compared and analyzed. The result of the analysis showed that the data transmission rate in the intelligent edge network was 97.48%, the data transmission time was 215 ms, and the recovery time of network failure was 49,983 ms.

  • Regular paper December 31, 2022

    0 51 17

    Trends in Mobile Ransomware and Incident Response from a Digital Forensics Perspective

    Min-Hyuck Ko *, Pyo-Gil-Hong , and Dohyun Kim

    Journal of information and communication convergence engineering 2022; 20(4): 280-287

    Abstract : Recently, the number of mobile ransomware types has increased. Moreover, the number of cases of damage caused by mobile ransomware is increasing. Representative damage cases include encrypting files on the victim's smart device or making them unusable, causing financial losses to the victim. This study classifies ransomware apps by analyzing several representative ransomware apps to identify trends in the malicious behavior of ransomware. We present a technique for recovering from the damage, from a digital forensic perspective, using reverse engineering ransomware apps to analyze vulnerabilities in malicious functions applied with various cryptographic technologies. Our study found that ransomware applications are largely divided into three types: locker, crypto, and hybrid. In addition, we presented a method for recovering the damage caused by each type of ransomware app using an actual case. This study is expected to help minimize the damage caused by ransomware apps and respond to new ransomware apps.

  • Regular paper December 31, 2022

    0 51 16

    Automatic Generation of Video Metadata for the Super-personalized Recommendation of Media

    Sung Jung Yong , Hyo Gyeong Park , Yeon Hwi You , and Il-Young Moon *, Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 288-294

    Abstract : The media content market has been growing, as various types of content are being mass-produced owing to the recent proliferation of the Internet and digital media. In addition, platforms that provide personalized services for content consumption are emerging and competing with each other to recommend personalized content. Existing platforms use a method in which a user directly inputs video metadata. Consequently, significant amounts of time and cost are consumed in processing large amounts of data. In this study, keyframes and audio spectra based on the YCbCr color model of a movie trailer were extracted for the automatic generation of metadata. The extracted audio spectra and image keyframes were used as learning data for genre recognition in deep learning. Deep learning was implemented to determine genres among the video metadata, and suggestions for utilization were proposed. A system that can automatically generate metadata established through the results of this study will be helpful for studying recommendation systems for media super-personalization.

  • Regular paper December 31, 2022

    0 46 16

    LSTM Model-based Prediction of the Variations in Load Power Data from Industrial Manufacturing Machines

    Rita Rijayanti , Kyohong Jin , and Mintae Hwang , Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 295-302

    Abstract : This paper contains the development of a smart power device designed to collect load power data from industrial manufacturing machines, predict future variations in load power data, and detect abnormal data in advance by applying a machine learning-based prediction algorithm. The proposed load power data prediction model is implemented using a Long Short-Term Memory (LSTM) algorithm with high accuracy and relatively low complexity. The Flask and REST API are used to provide prediction results to users in a graphical interface. In addition, we present the results of experiments conducted to evaluate the performance of the proposed approach, which show that our model exhibited the highest accuracy compared with Multilayer Perceptron (MLP), Random Forest (RF), and Support Vector Machine (SVM) models. Moreover, we expect our method's accuracy could be improved by further optimizing the hyperparameter values and training the model for a longer period of time using a larger amount of data.

  • Regular paper December 31, 2022

    0 47 13

    ResNet-Based Simulations for a Heat-Transfer Model Involving an Imperfect Contact

    Guangxing Wang , Gwanghyun Jo , and Seong-Yoon Shin , Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 303-308

    Abstract : Simulating the heat transfer in a composite material is an important topic in material science. Difficulties arise from the fact that adjacent materials cannot match perfectly, resulting in discontinuity in the temperature variables. Although there have been several numerical methods for solving the heat-transfer problem in imperfect contact conditions, the methods known so far are complicated to implement, and the computational times are non-negligible. In this study, we developed a ResNet-type deep neural network for simulating a heat transfer model in a composite material. To train the neural network, we generated datasets by numerically solving the heat-transfer equations with Kapitza thermal resistance conditions. Because datasets involve various configurations of composite materials, our neural networks are robust to the shapes of material-material interfaces. Our algorithm can predict the thermal behavior in real time once the networks are trained. The performance of the proposed neural networks is documented, where the root mean square error (RMSE) and mean absolute error (MAE) are below 2.47E-6, and 7.00E-4, respectively.

  • Regular paper December 31, 2022

    0 76 17

    Text Summarization on Large-scale Vietnamese Datasets

    Ti-Hon Nguyen and Thanh-Nghi Do , Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 309-316

    Abstract : This investigation is aimed at automatic text summarization on large-scale Vietnamese datasets. Vietnamese articles were collected from newspaper websites and plain text was extracted to build the dataset, that included 1,101,101 documents. Next, a new single-document extractive text summarization model was proposed to evaluate this dataset. In this summary model, the k-means algorithm is used to cluster the sentences of the input document using different text representations, such as BoW (bag-of-words), TF-IDF (term frequency – inverse document frequency), Word2Vec (Word-to-vector), Glove, and FastText. The summary algorithm then uses the trained k-means model to rank the candidate sentences and create a summary with the highest-ranked sentences. The empirical results of the F1-score achieved 51.91% ROUGE-1, 18.77% ROUGE-2 and 29.72% ROUGE-L, compared to 52.33% ROUGE-1, 16.17% ROUGE-2, and 33.09% ROUGE-L performed using a competitive abstractive model. The advantage of the proposed model is that it can perform well with O(n,k,p) = O(n(k + 2/p)) + O(nlog2n) + O(np) + O(nk2) + O(k) time complexity.

  • Regular paper December 31, 2022

    0 58 12

    An Autonomous Operational Service System for Machine Vision-based Inspection towards Smart Factory of Manufacturing Multi-wire Harnesses

    Seung Beom Hong and Kyou Ho Lee , Member, KIICE

    Journal of information and communication convergence engineering 2022; 20(4): 317-325

    Abstract : In this study, we propose a technological system designed to provide machine vision-based automatic inspection and autonomous operation services for an entire process related to product inspection in wire harness manufacturing. The smart factory paradigm is a valuable and necessary goal, small companies may encounter steep barriers to entry. Therefore, the best approach is to develop towards this approach gradually in stages starting with the relatively simple improvement to manufacturing processes, such as replacing manual quality assurance stages with machine vision-based inspection. In this study, we consider design issues of a system based on the proposed technology and describe an experimental implementation. In addition, we evaluated the implementation of the proposed technology. The test results show that the adoption of the proposed machine vision-based automatic inspection and operation service system for multi-wire harness production may be considered justified, and the effectiveness of the proposed technology was verified.

Dec 31, 2022 Vol.20 No.4, pp. 235~325

Most KeyWord ?

What is Most Keyword?

  • It is most registrated keyword in articles at this journal during for 2 years.

Most Read

Editorial Office

Journal of Information and Communication Convergence Engineering Jouranl of information and
communication convergence engineering
(J. Inf. Commun. Converg. Eng.)

eISSN 2234-8883
pISSN 2234-8255