+ All Categories
Home > Documents > Journal Editorial Board -  · 2015. 11. 12. · Journal Editorial Board Editor-in-Chief . Prof....

Journal Editorial Board -  · 2015. 11. 12. · Journal Editorial Board Editor-in-Chief . Prof....

Date post: 06-Feb-2021
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
41
Transcript
  • Journal Editorial Board

    Editor-in-Chief

    Prof. Thomas Byeongnam YOON, PhD.

    Founding Editor-in-Chief

    ICACT Transactions on the Advanced Communications Technology (TACT)

    Editors

    Prof. Jun-Chul Chun, Kyonggi University, Korea Dr. JongWon Kim, GIST (Gwangju Institute of Science & Technology), Korea Dr. Xi Chen, State Grid Corparation of China, China Prof. Arash Dana, Islamic Azad university , Central Tehran Branch, Iran Dr. Pasquale Pace, University of Calabria - DEIS - Italy, Italy Dr. Mitch Haspel, Stochastikos Solutions R&D, Israel Prof. Shintaro Uno, Aichi University of Technology, Japan Dr. Tony Tsang, Hong Kong Polytechnic UNiversity, Hong Kong Prof. Kwang-Hoon Kim, Kyonggi University, Korea Prof. Rosilah Hassan, Universiti Kebangsaan Malaysia(UKM), Malaysia Dr. Sung Moon Shin, ETRI, Korea Dr. Takahiro Matsumoto, Yamaguchi University, Japan Dr. Christian Esteve Rothenberg, CPqD - R&D Center for. Telecommunications, Brazil Prof. Lakshmi Prasad Saikia, Assam down town University, India Prof. Moo Wan Kim, Tokyo University of Information Sciences, Japan Prof. Yong-Hee Jeon, Catholic Univ. of Daegu, Korea Dr. E.A.Mary Anita, Prathyusha Institute of Technology and Management, India Dr. Chun-Hsin Wang, Chung Hua University, Taiwan Prof. Wilaiporn Lee, King Mongkut’s University of Technology North, Thailand Dr. Zhi-Qiang Yao, XiangTan University, China Prof. Bin Shen, Chongqing Univ. of Posts and Telecommunications (CQUPT), China Prof. Vishal Bharti, Dronacharya College of Engineering, India Dr. Marsono, Muhammad Nadzir , Universiti Teknologi Malaysia, Malaysia Mr. Muhammad Yasir Malik, Samsung Electronics, Korea Prof. Yeonseung Ryu, Myongji University, Korea Dr. Kyuchang Kang, ETRI, Korea Prof. Plamena Zlateva, BAS(Bulgarian Academy of Sciences), Bulgaria Dr. Pasi Ojala, University of Oulu, Finland Prof. CheonShik Kim, Sejong University, Korea Dr. Anna bruno, University of Salento, Italy Prof. Jesuk Ko, Gwangju University, Korea Dr. Saba Mahmood, Air University Islamabad Pakistan, Pakistan Prof. Zhiming Cai, Macao University of Science and Technology, Macau Prof. Man Soo Han, Mokpo National Univ., Korea Mr. Jose Gutierrez, Aalborg University, Denmark

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Dr. Youssef SAID, Tunisie Telecom, Tunisia Dr. Noor Zaman, King Faisal University, Al Ahsa Hofuf, Saudi Arabia Dr. Srinivas Mantha, SASTRA University, Thanjavur, India Dr. Shahriar Mohammadi, KNTU University, Iran Prof. Beonsku An, Hongik University, korea Dr. Guanbo Zheng, University of Houston, USA Prof. Sangho Choe, The Catholic University of Korea, korea Dr. Gyanendra Prasad Joshi, Yeungnam University, korea Dr. Tae-Gyu Lee, Korea Institue of Industrial Technology(KITECH), korea Prof. Ilkyeun Ra, University of Colorado Denver, USA Dr. Yong Sun, Beijing University of Posts and Telecommunications, China Dr. Yulei Wu, Chinese Academy of Sciences, China Mr. Anup Thapa, Chosun University, korea Dr. Vo Nguyen Quoc Bao, Posts and Telecommunications Institute of Technology, Vietnam Dr. Harish Kumar, Bhagwant institute of technology, India Dr. Jin REN, North china university of technology, China Dr. Joseph Kandath, Electronics & Commn Engg, India Dr. Mohamed M. A. Moustafa, Arab Information Union (AIU), Egypt Dr. Mostafa Zaman Chowdhury, Kookmin University, Korea Prof. Francis C.M. Lau, Hong Kong Polytechnic University, Hong Kong Prof. Ju Bin Song, Kyung Hee University, korea Prof. KyungHi Chang, Inha University, Korea Prof. Sherif Welsen Shaker, Kuang-Chi Institute of Advanced Technology, China Prof. Seung-Hoon Hwang, Dongguk University, Korea Prof. Dal-Hwan Yoon, Semyung University, korea Prof. Chongyang ZHANG, Shanghai Jiao Tong University, China Dr. H K Lau, The Open University of Hong Kong, Honh Kong Prof. Ying-Ren Chien, Department of Electrical Engineering, National Ilan University, Taiwan Prof. Mai Yi-Ting, Hsiuping University of Science and Technology, Taiwan Dr. Sang-Hwan Ryu, Korea Railroad Research Institute, Korea Dr. Yung-Chien Shih, MediaTek Inc., Taiwan Dr. Kuan Hoong Poo, Multimedia University, Malaysia Dr. Michael Leung, CEng MIET SMIEEE, Hong Kong Dr. Abu sahman Bin mohd Supa'at, Universiti Teknologi Malaysia, Malaysia Prof. Amit Kumar Garg, Deenbandhu Chhotu Ram University of Science & Technology, India Dr. Jens Myrup Pedersen, Aalborg University, Denmark Dr. Augustine Ikechi Ukaegbu, KAIST, Korea Dr. Jamshid Sangirov, KAIST, Korea Prof. Ahmed Dooguy KORA, Ecole Sup. Multinationale des Telecommunications, Senegal Dr. Se-Jin Oh, Korea Astronomy & Space Science Institute, Korea Dr. Rajendra Prasad Mahajan, RGPV Bhopal, India Dr. Woo-Jin Byun, ETRI, Korea Dr. Mohammed M. Kadhum, School of Computing, Goodwin Hall, Queen's University , Canada Prof. Seong Gon Choi, Chungbuk National University, Korea Prof. Yao-Chung Chang, National Taitung University, Taiwan Dr. Abdallah Handoura, Engineering school of Gabes - Tunisia, Tunisia Dr. Gopal Chandra Manna, BSNL, India

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Dr. Il Kwon Cho, National Information Society Agency, Korea Prof. Jiann-Liang Chen, National Taiwan University of Science and Technology, Taiwan Prof. Ruay-Shiung Chang, National Dong Hwa University, Taiwan Dr. Vasaka Visoottiviseth, Mahidol University, Thailand Prof. Dae-Ki Kang, Dongseo University, Korea Dr. Yong-Sik Choi, Research Institute, IDLE co., ltd, Korea Dr. Xuena Peng, Northeastern University, China Dr. Ming-Shen Jian, National Formosa University, Taiwan Dr. Soobin Lee, KAIST Institute for IT Convergence, Korea Prof. Yongpan Liu, Tsinghua University, China Prof. Chih-Lin HU, National Central University, Taiwan Prof. Chen-Shie Ho, Oriental Institute of Technology, Taiwan Dr. Hyoung-Jun Kim, ETRI, Korea Prof. Bernard Cousin, IRISA/Universite de Rennes 1, France Prof. Eun-young Lee, Dongduk Woman s University, Korea Dr. Porkumaran K, NGP institute of technology India, India Dr. Feng CHENG, Hasso Plattner Institute at University of Potsdam, Germany Prof. El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia Prof. Lin You, Hangzhou Dianzi Univ, China Mr. Nicolai Kuntze, Fraunhofer Institute for Secure Information Technology, Germany Dr. Min-Hong Yun, ETRI, Korea Dr. Seong Joon Lee, Korea Electrotechnology Research Institute, korea Dr. Kwihoon Kim, ETRI, Korea Dr. Jin Woo HONG, Electronics and Telecommunications Research Inst., Korea Dr. Heeseok Choi, KISTI(Korea Institute of Science and Technology Information), korea Dr. Somkiat Kitjongthawonkul, Australian Catholic University, St Patrick's Campus, Australia Dr. Dae Won Kim, ETRI, Korea Dr. Ho-Jin CHOI, KAIST(Univ), Korea Dr. Su-Cheng HAW, Multimedia University, Faculty of Information Technology, Malaysia Dr. Myoung-Jin Kim, Soongsil University, Korea Dr. Gyu Myoung Lee, Institut Mines-Telecom, Telecom SudParis, France Dr. Dongkyun Kim, KISTI(Korea Institute of Science and Technology Information), Korea Prof. Yoonhee Kim, Sookmyung Women s University, Korea Prof. Li-Der Chou, National Central University, Taiwan Prof. Young Woong Ko, Hallym University, Korea Prof. Dimiter G. Velev, UNWE(University of National and World Economy), Bulgaria Dr. Tadasuke Minagawa, Meiji University, Japan Prof. Jun-Kyun Choi, KAIST (Univ.), Korea Dr. Brownson ObaridoaObele, Hyundai Mobis Multimedia R&D Lab , Korea Prof. Anisha Lal, VIT university, India Dr. kyeong kang, University of technology sydney, faculty of engineering and IT , Australia Prof. Chwen-Yea Lin, Tatung Institute of Commerce and Technology, Taiwan Dr. Ting Peng, Chang'an University, China Prof. ChaeSoo Kim, Donga University in Korea, Korea Prof. kirankumar M. joshi, m.s.uni.of baroda, India Dr. Chin-Feng Lin, National Taiwan Ocean University, Taiwan Dr. Chang-shin Chung, TTA(Telecommunications Technology Association), Korea

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Dr. Che-Sheng Chiu, Chunghwa Telecom Laboratories, Taiwan Dr. Chirawat Kotchasarn, RMUTT, Thailand Dr. Fateme Khalili, K.N.Toosi. University of Technology, Iran Dr. Izzeldin Ibrahim Mohamed Abdelaziz, Universiti Teknologi Malaysia , Malaysia Dr. Kamrul Hasan Talukder, Khulna University, Bangladesh Prof. HwaSung Kim, Kwangwoon University, Korea Prof. Jongsub Moon, CIST, Korea University, Korea Prof. Juinn-Horng Deng, Yuan Ze University, Taiwan Dr. Yen-Wen Lin, National Taichung University, Taiwan Prof. Junhui Zhao, Beijing Jiaotong University, China Dr. JaeGwan Kim, SamsungThales co, Korea Prof. Davar PISHVA, Ph.D., Asia Pacific University, Japan Ms. Hela Mliki, National School of Engineers of Sfax, Tunisia Prof. Amirmansour Nabavinejad, Ph.D., Sepahan Institute of Higher Education, Iran

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Editor Guide

    Introduction for Editor or Reviewer

    All the editor group members are to be assigned as a evaluator(editor or reviewer) to submitted journal

    papers at the discretion of the Editor-in-Chief. It will be informed by eMail with a Member Login ID and

    Password.

    Once logined the Website via the Member Login menu in left as a evaluator, you can find out the paper

    assigned to you. You can evaluate it there. All the results of the evaluation are supposed to be shown in

    the Author Homepage in the real time manner. You can also enter the Author Homepage assigned to

    you by the Paper ID and the author's eMail address shown in your Evaluation Webpage. In the Author

    Homepage, you can communicate each other efficiently under the peer review policy. Please don't miss

    it!

    All the editor group members are supposed to be candidates of a part of the editorial board, depending

    on their contribution which comes from history of ICACT TACT as an active evaluator. Because the main

    contribution comes from sincere paper reviewing role.

    Role of the Editor

    The editor's primary responsibilities are to conduct the peer review process, and check the final camera-

    ready manuscripts for any technical, grammatical or typographical errors.

    As a member of the editorial board of the publication, the editor is responsible for ensuring that the

    publication maintains the highest quality while adhering to the publication policies and procedures of

    the ICACT TACT(Transactions on the Advanced Communications Technology).

    For each paper that the editor-in-chief gets assigned, the Secretariat of ICACT Journal will send the

    editor an eMail requesting the review process of the paper.

    The editor is responsible to make a decision on an "accept", "reject", or "revision" to the Editor-in-Chief

    via the Evaluation Webpage that can be shown in the Author Homepage also.

    Deadlines for Regular Review

    Editor-in-Chief will assign a evalaution group( a Editor and 2 reviewers) in a week upon receiving a

    completed Journal paper submission. Evaluators are given 2 weeks to review the paper. Editors are

    given a week to submit a recommendation to the Editor-in-Chief via the evaluation Webpage, once all or

    enough of the reviews have come in. In revision case, authors have a maximum of a month to submit

    their revised manuscripts. The deadlines for the regular review process are as follows:

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Evalution Procedure Deadline

    Selection of Evaluation Group 1 week Review processing 2 weeks

    Editor's recommendation 1 week Final Decision Noticing 1 week

    Making Decisions on Manuscript

    Editor will make a decision on the disposition of the manuscript, based on remarks of the reviewers. The

    editor's recommendation must be well justified and explained in detail. In cases where the revision is

    requested, these should be clearly indicated and explained. The editor must then promptly convey this

    decision to the author. The author may contact the editor if instructions regarding amendments to the

    manuscript are unclear. All these actions could be done via the evaluation system in this Website. The

    guidelines of decisions for publication are as follows:

    Decision Description Accept An accept decision means that an editor is accepting the paper with

    no further modifications. The paper will not be seen again by the editor or by the reviewers.

    Reject The manuscript is not suitable for the ICACT TACT publication.

    Revision The paper is conditionally accepted with some requirements. A revision means that the paper should go back to the original reviewers for a second round of reviews. We strongly discourage editors from making a decision based on their own review of the manuscript if a revision had been previously required.

    Role of the Reviewer

    Reviewer Webpage:

    Once logined the Member Login menu in left, you can find out papers assigned to you. You can also

    login the Author Homepage assigned to you with the paper ID and author's eMail address. In there you

    can communicate each other via a Communication Channel Box.

    Quick Review Required:

    You are given 2 weeks for the first round of review and 1 week for the second round of review. You must

    agree that time is so important for the rapidly changing IT technologies and applications trend. Please

    respect the deadline. Authors undoubtedly appreciate your quick review.

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Anonymity:

    Do not identify yourself or your organization within the review text.

    Review:

    Reviewer will perform the paper review based on the main criteria provided below. Please provide

    detailed public comments for each criterion, also available to the author.

    How this manuscript advances this field of research and/or contributes something new to the literature?

    Relevance of this manuscript to the readers of TACT? Is the manuscript technically sound? Is the paper clearly written and well organized? Are all figures and tables appropriately provided and are their resolution good quality? Does the introduction state the objectives of the manuscript encouraging the reader to read on? Are the references relevant and complete?

    Supply missing references:

    Please supply any information that you think will be useful to the author in revision for enhancing

    quality of the paperor for convincing him/her of the mistakes.

    Review Comments:

    If you find any already known results related to the manuscript, please give references to earlier papers

    which contain these or similar results. If the reasoning is incorrect or ambiguous, please indicate

    specifically where and why. If you would like to suggest that the paper be rewritten, give specific

    suggestions regarding which parts of the paper should be deleted, added or modified, and please

    indicate how.

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Journal Procedure

    Dear Author,

    You can see all your paper information & progress.

    Step 1. Journal Full Paper Submission

    Using the Submit button, submit your journal paper through ICACT Website, then you will get new

    paper ID of your journal, and send your journal Paper ID to the [email protected] for the review and

    editorial processing. Once you got your Journal paper ID, never submit again! Journal Paper/CRF

    Template

    Step 2. Full Paper Review

    Using the evaluation system in the ICACT Website, the editor, reviewer and author can communicate

    each other for the good quality publication. It may take about 1 month.

    Step 3. Acceptance Notification

    It officially informs acceptance, revision, or reject of submitted full paper after the full paper review

    process.

    Status Action Acceptance Go to next Step.

    Revision Re-submit Full Paper within 1 month after Revision Notification.

    Reject Drop everything.

    Step 4. Payment Registration

    So far it's free of charge in case of the journal promotion paper from the registered ICACT conference

    paper! But you have to regist it, because you need your Journal Paper Registration ID for submission of

    the final CRF manuscripts in the next step's process. Once you get your Registration ID, send it to

    [email protected] for further process.

    Step 5. Camera Ready Form (CRF) Manuscripts Submission

    After you have received the confirmation notice from secretariat of ICACT, and then you are allowed to

    submit the final CRF manuscripts in PDF file form, the full paper and the Copyright Transfer Agreement.

    Journal Paper Template, Copyright Form Template, BioAbstract Template,

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Journal Submission Guide

    All the Out-Standing ICACT conference papers have been invited to this "ICACT Transactions on the

    Advanced Communications Technology" Journal, and also welcome all the authors whose conference

    paper has been accepted by the ICACT Technical Program Committee, if you could extend new contents

    at least 30% more than pure content of your conference paper. Journal paper must be followed to

    ensure full compliance with the IEEE Journal Template Form attached on this page.

    How to submit your Journal paper and check the progress?

    Step 1. Submit Using the Submit button, submit your journal paper through ICACT Website, then you will get new paper ID of your journal, and send your journal Paper ID to the [email protected] for the review and editorial processing. Once you got your Journal paper ID, never submit again! Using the Update button, you can change any information of journal paper related or upload new full journal paper.

    Step 2. Confirm Secretariat is supposed to confirm all the necessary conditions of your journal paper to make it ready to review. In case of promotion from the conference paper to Journal paper, send us all the .DOC(or Latex) files of your ICACT conference paper and journal paper to evaluate the difference of the pure contents in between at least 30% more to avoid the self replication violation under scrutiny. The pure content does not include any reference list, acknowledgement, Appendix and author biography information.

    Step 3. Review Upon completing the confirmation, it gets started the review process thru the Editor & Reviewer Guideline. Whenever you visit the Author Homepage, you can check the progress status of your paper there from start to end like this, " Confirm OK! -> Gets started the review process -> ...", in the Review Status column. Please don't miss it!

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • 6J

    607

    614

    6203 An Adaptive Cooperative Protocol for Multi-Hop Wireless Networks

    Smich Butcharoen, Chaiyod Pirak

    The Sirindhorn International Thai-German Graduate School of Engineering (TGGS),

    King Mongkut's University of Technology North Bangkok, Bangkok, Thailand

    2 Structure Safety Inspection System Using Multiple Sensors and PTZ Camer

    Mi-jeong Park*, Eung-kon Kim*

    *Department of Computer Science, Sunchon National University, Korea

    SunChon National University, 255 Jungang-ro Suncheon Jeollanan-do, Republic of Korea

    Volume. 4 Issue. 3

    1 Open IPTV Convergence Service Creation and Management using Service Delivery Platform

    Changwoo Yoon

    ETRI (Electronics and Telecommunications Research Institute), Yusung, Daejeon, Korea

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Abstract—IPTV brought a new digital era in the broadcasting

    domain. The main change of digital broadcasting is an advent of a bi-directional interactive service feature. Using that bi-directionality, IPTV provides various kinds of convergence service such as information providing, advertisement, and e-commerce. But the number of services required to be developed and to be provided to users geometrically increases and the lifetime of services is shortened requiring services to be developed within a short period. To support the market demand for a massive service delivery, the IPTV platform based on service delivery platform (SDP) is essential. The SDP is a technique developed to meet the variation in communication and information technology convergence environments, allows service providers to rapidly create and deliver convergence services. This paper describes an Open IPTV service delivery platform structure and method for supporting rapid service creation by reusing pre-defined IPTV service components. We describe key components and functionalities of SDP, IPTV Enablers and its combination for service convergence. We show customer targeted mobile advertisement for Open IPTV convergence service example.

    Keyword— IPTV, SDP, SOA, ACAP, Open IPTV Platform

    I. INTRODUCTION

    he main environmental change brought on by digital broadcasting such as IPTV, Smart TV and digital cable

    TV is an advent of a bi-directional broadcasting business that uses a telecommunication return channel. This is a change from ‘TV as a medium of transaction’, which is one way

    watching of analogue TV, to ‘TV as a marketplace’, which connects the viewer directly, collects the viewer’s opinion

    bi-directionally, and reapplies the viewer’s reaction to service. Figure 1 shows various examples of bi-directional convergence services combining broadcasting, telecommunication and related information [1, 2, and 3].

    Using those bi-directional characteristic, IPTV provides various kinds of convergence service such as information providing, advertisement, and e-commerce. But development of new convergence service is difficult because most of IPTV broadcasting system in Korea uses ACAP (Advanced Common Application Platform) as a base middleware platform [4]. The ACAP API has different shape according to IPTV service providers. General Service developer cannot

    ———————————————————————

    Manuscript received June 1, 2014. Changwoo Yoon is a principle researcher with Electronics and

    Telecommunications Research Institute, 161 Kajung, Yusung, Daejeon, Korea (phone: +82-42-860-6543; fax +82-42-860-5611; e-mail: [email protected]).

    easily develop those telco-dependent ACAP applications. The characteristic of IPTV convergence service is a

    dependency with broadcasting content. The convergence services provided during channel service are tightly coupled with the contents of channel service. For example, channel content related information is shown on TV for the information providing service. For the advertisement, content related advertisements are selected and shown on TV.

    Fig. 1. Example of IPTV convergence service

    The number of services required to be developed and to be provided to users geometrically increases and the lifetime of services is shortened requiring services to be developed within a short period. Furthermore, with the rapid development of information technology such as web technology, there is a need to integrate information, communication and broadcasting technologies to create new convergence services. Moreover, users want to receive services only for themselves and act not only as service consumers but also service prosumers with the spread of various personal devices. [5] The ACAP is not sufficient to support those requirements.

    In the enterprise domain, the SOA (Service Oriented Architecture) has been used for integrating various kinds of business services. In SOA, systems are divided into basic service components. These services are distinct units that can be independently reusable. The Service Delivery Platform (SDP) is one of implementations of the SOA concept in an enterprise domain [6].

    A service delivery platform (SDP) is a technique developed to meet this variation in communication and information technology environments, allows common carriers to rapidly create and deliver services efficiently to provide the services and assists third party service providers or personal

    Open IPTV Convergence Service Creation and Management using Service Delivery Platform

    Changwoo Yoon

    ETRI (Electronics and Telecommunications Research Institute), Yusung, Daejeon, Korea

    [email protected]

    T

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 607

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • information providers in efficiently participating in service business. [5, 6]

    Conventional techniques relating to the SDP mostly define the SDP as a set of enablers corresponding to abstract forms of physical devices of a network or the Internet. These conventional techniques provide general SDP structures in which service common functions such as an operation support system (OSS)/business support system (BSS) are connected with the enablers of the SDP to enable rapid service creation and third party service providers and users can abstract functions to create and provide services even if the third party service providers and the users are not network operators. [7, 8, 9]

    Fig.2. Major characteristics of SDP

    This paper describes an Open IPTV service delivery platform structure and method for supporting circumstances in which users can be a service provider. We describe key components and functionalities of SDP, IPTV Enablers and its combination for service convergence. We show customer targeted mobile advertisement for Open IPTV convergence service example.

    II. KEY COMPONENTS OF SDP

    A. Common BUS

    Fig.3. Architecture of SDP

    Figure 3 is a common architecture of SDP providing convergence services. The concept of SDP consists of two parts: Common BUS and Enablers. The Common BUS is an execution environment of Web services and web service directories. The common BUS has a similar role with that of the Enterprise Service Bus (ESB). The ESB is a mediating hub at the time of Web Service coordination. It acts as a message broker between services. When an application tries to find Web Service in its routine, ESB finds the appropriate

    Web Service with application’s context.

    B. Enablers

    The original concept of enablers came from Open Mobile Alliance (OMA). The enablers are the function that abstracts network functions and provides them to third party application developers through application programming interface (API). Enablers interact with each other and create other services. The OMA does not specify a protocol for the interfaces of enablers or a specific mechanism for combining these enablers. [6] Enabler is a building block that encapsulates reusable functionality.

    We used Web services specification for the implementation of enablers. Web Service Description Language (WSDL) is used to describe the interface of services provided by enablers. Simple Object Access Protocol (SOAP) protocol is used to communicate between services.

    C. Server Configuration

    Figure 4 shows SDP server configuration. The virtual service and service distribution will be explained at chapter III. The Session Manager is used to create a new session in SDP. The service creation environment is used for making convergence service primary scenario. It provides graphical user interface to drag and drop service enabler functions to make the scenario. Service registry saves service information and portal server reveals the interface of service enablers to be used to make convergence service.

    Fig.4. SDP server configuration

    III. KEY FUNCTIONALITIES OF SDP

    A. Service Virtualization

    Fig.5. Concept of Service Virtualization

    Service virtualization is a recent trend of SOA focusing on providing common infrastructure to create and manage complex service eco-system. By using service virtualization, service developer can focus on service feature developing without worrying on how functions are provided, consumed, and managed.

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 608

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Service virtualization does not modify general service code, rather makes virtual service providing the API functions before executing service. The key idea of service virtualization is service brokering residing between service client and service implementation.

    Service brokering is needed for a separation of client and general service. In this architecture, client cannot connect directly with general service. It can only communicate through brokering service. At the position of service brokering, virtualized service is hosted and exported to service user.

    Service broker reads information for DB and decides how to host virtualized service. This approach exports several virtualized service for one general service, we can adopt easily to various customer scenarios.

    All communications are transmitted through service broker. We can provide various kinds of brokering services: version control, protocol transfer, monitoring, and real time policy decision. Service virtualization does not change client and general service code.

    Service virtualization has several advantages. It provides independent ownership of SOA’s each layer. For example, service provider develops service interfaces and logics. Operator describes endpoint policy and message standards. Architect professionals define service level policy and execution patterns. Business owner describes business policy and requirements. All of above can cooperate at the centre points.

    Eventually, service virtualization reduces time-to-market for a new service and provides more flexible and substantial methods for managing service environment.

    Fig.6. Architecture of Service Virtualization

    Figure 6 shows implementation model of service virtualization. It parses general service’s WSDL, analyses information, and then registers into service registry.

    B. Location Transparency

    Fig.7. Concept of Location Transparency

    For a client, there must be no distinction between the usage of local and remote SOA services. They should be accessed in the same manner as if they were present in the local SOA framework. To provide location transparency, the SDP manages service location at registry and mediate it. With this feature, service execution is not affected by the change of service location.

    C. Service Authorization

    The SDP service delivery control function assists managing and selling of the value-added services. Delivery control may include user and partner authentication, authorization, credit control, and SLA enforcement. [12]

    For services requiring a user limitation, certification is granted an access to only authorized users. Also the SDP authorization function provides WS-Security standard that is Web service authentication capability

    Fig.8. Concept of Service Authorization

    D. Service Protocol Conversion

    To easy the creation of convergence service, an ESB used as a transitional gateway to convert protocols. Today with introduction of WEB 2.0, there are a lot of de-fecto standard protocol like XML/HTTP RPC, REST,JSON etc. Sometimes SOA systems have to support these kinds of protocols. The generic proxy pattern provides a protocol converter.

    Fig.9. Concept of Service Protocol Translation

    There are several types of proxy listed below: [13] Edge Proxy (Inbound): This is entry point of our ESB.

    It covers protocol conversion to internal SOA protocol. (Web services)

    Common Proxy: This is point to handle cross cutting concerns for system authorization, authentication, logging, billing etc. And route the service request to appropriate local proxy.

    Local Proxy: It is one-to-one mapping to Business service. It can just forward request to business service or it contains mediation logics. (Intermediary logic – Transformation, Routing, Function adding, etc.)

    Edge Proxy (Outbound/Optional): This proxy is another edge proxy for outbound protocol conversion. This is optional. In our architecture internal protocols are integrated with web service. This proxy is used for legacy integration.

    E. Message Format Conversion

    Along with the protocol conversion, the message format conversion is needed because the number and types of arguments are different.

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 609

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Fig.10. Concept of Message Format Change

    F. Message Routing

    Based on the type of individual message, the message routing function sends the message to one of the many services available out-of-the-box on the platform.

    Fig.11. Concept of Message Routing

    G. Monitoring

    Service delivery platform should have total functions to create, manage, and providing convergence service. The monitoring function is mandatory for managing and provisioning of convergence services.

    Fig.12. Concept of Monitoring

    IV. OPEN IPTV PLATFORM

    IPTV is defined as multimedia services such as television /video/audio/text/graphics/data delivered over IP based networks managed to provide the required level of QoS/QoE, security, interactivity and reliability by ITU-T Focus Group.

    If we focus convergence, we can define IPTV as multimedia services delivered over IP based wire & wireless converged networks managed to provide the required level of QoS/QoE, security, interactivity, reliability and openness, and for any contents to be optimally consumed and generated by users anywhere, anytime, and with any device.

    The main features of IPTV are bi-directionality and openness. IPTV platform has an importance to support these features.

    We developed open IPTV platform with four characteristics: openness, personalization, convergence and

    prosumer support. The Open IPTV platform is prosumer concept next generation platform technology that anyone can easily create, process and edit services.

    Fig.13. Concept of Open IPTV Platform

    Typically, IPTV platform means middleware. The IPTV middleware uses client/server architecture and the client often resides at the STB. The middleware controls the customer interaction with the service and, therefore, plays a very important role in controlling the customer’s overall

    experience. The definition of IPTV middleware is a layer of software between applications and resources, which consists of a set of service enablers that allow multiple functionalities running on one or more devices in an IPTV system to interact across a network. Figure 14 shows a concept of IPTV middleware.

    Fig.14. IPTV middleware concept

    IPTV middleware also defines and manages subscribers, the services available to them, the business rules and the billable transactions associated with their use of the system. It also oversees or directly manages content assets, physical assets, and to an extent, oversees and manages many of the subsystems of the end-to-end IPTV deployment ecosystem. As such, it is extremely complex, not to mention the fact that the operators deploying it are generally not familiar with some of its core enabling technologies, nor with the services it enables.

    Previously, when only wired and wireless telephones existed in the communication environment, network operators or service providers generated and provided services, and the number of generated services was small. A collective system for executing a service, such as a service providing system or a service/user management system was constructed for the

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 610

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • service whenever needed. [11] In the current service environment in which circuit-based

    communication is changing to Internet-centric packet-based communication and into which wired and wireless communications are integrated, the number of services required to be developed and provided to users geometrically increases and the lifespan of services is shortened to allow for services being developed within a short period. Furthermore, with the rapid development of information technology such as web technology, there is a need to integrate information, communication and broadcasting technologies to create new convergence services. Moreover, users want to receive services only for themselves and act not only as service consumers but also service prosumers with the growing popularity of various personal devices. [11]

    Fig.15. Comparison with Smart Device platform and Service Platform

    To meet these changing environments, there are several attempts to include service platform technologies into IPTV such as Open API and SDP (Service Delivery Platform).

    The Platform makes it possible to develop services network provider independently. It shortens the development period by recycling existing services, which makes it easy to develop various convergence and personalized services. The shorter development time gives CAPEX/OPEX (Capital Expenditure, Operational Expenses) advantages to service provider: fast commercialization, extending business opportunities.

    Sometimes, we confuse the service platform to device platform. The device platform has SDK and Open API to execute applications in device. The SDK has libraries and interfaces for OS and applications shown in figure 15.

    The service platform resides in server not in terminal device providing service components and interfaces.

    Figure 16 shows Open IPTV platform SDP enablers. It has hierarchical structure. At the very low level of the platform, network support enablers control network capability according to service request such as bandwidth.

    Primitive service enablers are grouped as broadcast control, telecommunication service control, web content control, and information control. In each group, unit enablers are defined that has an atomic function. Combining these unit enablers, the platform consist convergence service control group layer. The combined enablers defined in highest layer looks like service. The application server (AS) executes customer service that calls platform enablers as a reusable function.

    Fig.16. IPTV platform Enablers

    Figure 17 shows how the IPTV service reuses platform enablers. For example, telemedicine service uses group casting, messaging, CoD, presence, and video phone primitive enablers. And it uses screen sharing, simultaneous viewing, conference screen sharing, and conference simultaneous viewing convergence enablers.

    Other services such as distance education and smart work shares defined enablers of IPTV platform.

    Fig.17. Reuse of Enablers

    Figure 18 shows service enabler hierarchy. The primitive service enablers are composed of unit functions, which can be used for creating convergence service shown as grey box in figure 18. For example, service C uses function 1, 2, and 5 in CoD (Contents on Demand) enabler.

    Fig.18. Service Enabler Hierarchy

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 611

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Figure 19 shows targeted advertisement service created using IPTV platform. While customer are watching VOD or real-time channel service, advertisement is sent to user’s smartphone that is prepared according to contents and customer properties such as VOD’s actor, user’s sex, age, etc.

    Fig.19. Tatgeted advertisement service

    The split EPG terminal has a function controlling IPTV service via home AP. A mobile user watches golf sports channel in VOD service. He already gave his preferences to the profile enabler via open service platform. For instance, since the profile enabler knows that he enjoys golf as outdoor sports, when he detects golf driver on watching golf contents, the mobile advertisement process enabler may give him advertisement moving picture about newly released golf driver. Mobile advertisement process enabler may give helpful information to him as well as connect to the purchase step by the mobile device.

    Open Service Platform

    Split EPG Terminal

    (IPTVUsr01)IPTV Screen

    Mobile AD Agent

    (ADProv01)

    Mobile AD Process Enabler

    (ADSrv01)

    Deliver Golf Moving Picture

    Deliver Golf Moving Picture

    Search Golf AdsReturn Ad

    Media Enabler(VODSrv01)

    Profile Enabler(IPTVProf01)

    Request Golf VOD

    Deliver Golf Moving picture

    Request User Preference

    Give User Information

    Request AD Event

    Event time

    Insert AD Metadata Into

    Golf VOD

    Request Split EPG User Info.

    Acquire Split EPG User Info.

    Fig.20. Service flows of Targeted Advertising Service

    Fig. 20 shows example of targeted advertisement service using SDP. Mobile advertisement agent may be person or sub-system of an advertisement service provider. He also watches a golf VOD service via media enabler within open service platform. The mobile advertisement process enabler searches a golf advertisement among many advertisement contents of a mobile advertisement agent. That golf advertisement is related with revealed product in golf moving picture. The mobile advertisement process enabler acquires user preference and check if mobile users own split EPG

    terminals. The convergence enabler then inserts advertisement metadata into golf VOD. A mobile user with split EPG terminal requests to view golf contents to open service platform. As soon as golf moving picture is delivered to an IPTV user, advertisement request event is generated.

    We made other convergence service combining web API and personal data.

    Fig.21. Smart Content Recommendation Service

    Figure 21 shows smart content recommendation service that recommends related content based on user’s personal history. For the content generation, the enablers search web space in real-time based on Web open API. The platform automatically aware the device used, then provide appropriate contents according to the device’s capability such as CPU clock speed, screen size, etc.

    The SDP has service creation environment (SCE) shown on figure 22. The SCE has graphical user interface that makes it possible to edit convergence services using service components. It also has a creation function of composite component combining unit components.

    Fig.22. Service creation environment and deploy of service

    V. CONCLUSIONS

    Service Delivery Platform (SDP) used for a creation and management of convergence services. Service virtualization is a key concept of SDP for a service convergence because it provides service feature independence among unit services (components) of convergence services.

    Service provider can create service components using standard interface without worrying how to integrate each unit services. After creation of service components, the service provider can create convergence service combining those reusable components. Using the SDP’s feature, the efforts of service creation can be reduced more than half.

    The easy service creation feature will brought a business

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 612

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • market chance: creating various business models such as prosumers, service provider, hosting provider, MVNO, and Telco shown in figure 23.

    Fig.23. Business model brought by using SDP

    IPTV service is an example of convergence service between telecommunication and broadcasting services. SDP will have an essential role on convergence service creation and management because of its SOA concepts.

    We developed several service component groups for SDP based IPTV service platform such as broadcasting service control, telecommunication service control, web contents control, network support, and information control. For example, the telecommunication service control components group consists of video telephone, group casting, messaging. With those components, IPTV service provider can create convergence IPTV service providing telephone call notice or PIP video-phone screen while watching channel broadcasting.

    Using open platform, we can make social service by making social service components shown in figure 24.

    Fig.24. Social service enablers

    The SDP expected to be a key part for M2M (Machine to machine) or IoT (Internet of Things) service platform because of its easy way of creating convergence services.

    REFERENCES

    [1] Changwoo Yoon, H. Lee, S.H.Jeon, H. Lee, “Mobile Digital Signage System based on Service Delivery Platform,” ICT Convergence (ICTC), 2011, pp. 582-586, Sep. 2011.

    [2] Changwoo Yoon, H. Lee, W. Lyu, B. Kim, “IPTV Service and Evolution direction of technology,” KICS magazine, pp. 3-11, Aug. 2008.

    [3] Changwoo Yoon, H.Lee, W.Ryu, “Next Generation IPTV Platform,” Optical Internet(COIN) 2010 9th international conference, pp.1-3, Jul. 2010.

    [4] ATSC Standard: Advanced Common Application Platform (ACAP), ww.atsc.org/cms/standards/a_101a.pdf , 2009

    [5] Changwoo Yoon, Shinmo Kim, Hyunwoo Lee, “Convergence Service Implementation based on Service Delivery Platform and Research Issues,” International Technical Conference on Circuits/Systems, Computers and Communications, pp. 1080-1083, July 2009.

    [6] H. Ohnishi, Y. Yamato, M. Kaneko, T. Moriya, M. Hirano, and H. Sunaga, “Service delivery platform for teleco-enterprise-Internet combined services”, IEEE GLOBECOM, pp.108-112, 2007.

    [7] Sun Young Lee, Jong Yun Lee, and Byung Il Lee, “Service Composition Techniques Using Data Mining for Ubiquitous Computing Environments”, International Journal of Computer Science and Network Security, Vol 6., No 9B, September 2006.

    [8] Nilanjan Banerjee, et. Al., “Telecom Telecom mashups: enabling web 2.0 for telecom services”, International Conference on Ubiquitous Information Management and Communication, pp.146-150, 2008.

    [9] Moriya, T.; Ohnishi, H.; Yoshida, M.; Hirano, M., “Dataflow Generation for Service Composition to Incorporate Web and Telecommunication”, GLOBECOM 2007, pp.26-30, Nov. 2007.

    [10] Soonchul Jung Mi-Kyoung Kang Dae-Woo Choi, “Call/Messaging Open API for Telecommunication Services”, 10th International Conference on Advanced Communication Technology, pp.1139-1143, Feb. 2008.

    [11] Changwoo Yoon, et al., “Convergence Service Implementation based on Service Delivery Platform and Research Issues,” ITC-CSCC, 2009

    [12] Johnston, Andy, et al. "Evolution of service delivery platforms." Ericsson Review 1 (2007): 19-25.

    [13] Terry Cho, “ESB Design Pattern – Generic Proxy Pattern,”, http://javamaster.wordpress.com/page/2/, 2009

    Changwoo Yoon received the B.S. degree from Sogang University, Seoul, Korea, in 1990. He received M.S. degree from POSTECH, Pohang, Korea, in 1992. He received Ph.D. degree in Computer & Information Science & Engineering from University of Florida, US, in 2005. Currently he is principal researcher in Consilience-based Research section, ETRI and adjunct professor at University of Science and

    Technology. His current research interests include Future Services, Brain Science, N-Screen, IPTV, Cloud computing, SOA, Service creation/delivery technology and information retrieval

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 613

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

    http://javamaster.wordpress.com/page/2/

  • Abstract—In recent years, those aging buildings such as the high-rise buildings and the chemical plant structures generate many social and economic issues due to crack, fire and collapse. Furthermore, these social and economic issues will lead to national loss. The aforementioned problems cannot be resolved through human eye or human power. This thesis proposes the structure safety inspection system using a small aircraft equipped with multiple sensors in order to address these problems. This small aircraft saves and manages the data obtained through the structure inspection and also provides efficient information. The purposes of this thesis are to synchronize, save and manage multiple sensor data, video and thermos graphical data that are transmitted from a small aircraft and also to implement the safety inspection integrated management system that provides inspection results and history information.

    Keyword— Multi-Sensor, Small Flying Vehicles, Sensor Fusion, Monitoring System, PTZ

    I. INTRODUCTION

    ecently, as outdated high-rise buildings, bridge piers,

    wind power generators, petro-chemical plant structures

    are deteriorated, a lot of problems for the dangerous situation

    such as internal/external cracking, fire and disasters are taken

    place and create a social issue. In order to detect dangerous

    situations and cracking, there is a small flying vehicle that

    does the work that is hard to be inspected by the workers as a

    proxy. This small flying vehicle mounted with various

    sensors provides a function of integrated management

    services from structure monitoring to safety inspection. A

    process of developing small flying vehicle and verifying its

    performance for safety inspection of structures is continuity of

    complicated process from its design to test flight and a lot of

    cost and research time are required. In order to perform safety

    inspection for the structures, mounted various sensors are

    required to be measured and measured result is required to be

    transmitted. This study intends to suggest efficient wireless

    ———————————————————————

    Manuscript received October 31, 2014 This work was financially

    supported by the Ministry of Education (MOE) and National Research

    Foundation of Korea(NRF) through the Human Resource Training Project

    for Regional Innovation (No. 2014H1B8A2032217).

    E. Kim is with Department of Computer Science, Sunchon National University, 255 Jungang-ro Suncheon Jeollanan-do, Republic of Korea (phone : 82-61-750-3627, fax : 061-755-7999, email: kek@ sunchon.ac.kr).

    M. Park. is with Department of Computer Science, Sunchon National University, 255 Jungang-ro Suncheon Jeollanan-do, Republic of Korea email : mj21@ sunchon.ac.kr).

    transmission, control technique for sensor data including

    sensing space of sensed data, data accumulation and its

    transmission.

    This study intends to design integrated management system

    for safety test that stores and controls multiple sensor data,

    image, thermal infrared image, and data being transmitted

    from small flying vehicle through its synchronization and

    provides test result and historical data information.

    II. PROCEDURE FOR PAPER SUBMISSION

    Various sensors, imaging equipment and communication

    equipment are mounted on unmanned small flying vehicle.

    Data obtained from mounted various sensors and devices will

    be controlled and information provision service will be

    researched [1,2].

    A. Review Stage Type of sensor TABLE 1. Kinds of sensors

    Temperature sensor is a device used for recording or

    controlling temperature by detecting temperature of fluid such

    as air or water or wall. Detected temperature is converted to

    electric signal and transmitted [3].

    Humidity sensor is a device that detects humidity and

    outputs such humidity as electric signal. This sensor uses a

    mechanism that electric resistance and its capacity of porous

    ceramics and polymer electrolyte are changed due to physical

    absorption of moisture.

    CO sensor is a sensor used for detecting carbon monoxide.

    In our living environment, dangerous gases of numerous types

    exist and recently, gas-related accident in ordinary homes,

    business places and construction sites, explosion accident in

    petrochemical combine, mines, chemical plants and pollution,

    Structure Safety Inspection System Using

    Multiple Sensors and PTZ Camera

    Mi-jeong Park*, Eung-kon Kim*

    *Department of Computer Science, Sunchon National University, Korea

    SunChon National University, 255 Jungang-ro Suncheon Jeollanan-do, Republic of Korea

    [email protected], [email protected]

    R

    CO Sensor VOC Sensor Dust Sensor

    Ozone Sensor CO2 Sensor Humidity sensor

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 614

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • contamination are taken place in a row. As it is almost

    impossible for human sensory system to quantify

    concentration of dangerous gas or discriminate its type, gas

    sensor that uses physical, chemical properties of substances is

    used for detecting gas leakage, measuring its concentration

    and warning dangerous situation.

    CO2 sensor is a device for measuring carbon dioxide. Most

    common principle of CO2 sensor is NDIR and chemical gas

    sensor. Measuring carbon dioxide is important for monitoring

    indoor air quality and various industrial processes.

    Ozone sensor is a device for measuring ozone

    concentration in atmosphere. Dust sensor is a device for

    detecting floating dust or number of condensation nucleus.

    VOC sensor is a device for evaluating air quality based on

    the amount of volatile organic compounds –cigarette smoke,

    harmful smoke and odour being generated at the time of

    cooking, outside pollution source, pollution source of living

    organisms [4].

    B. Final Stage Structures that require safety test by small flying vehicle

    TABLE 2. Diversified structures that require safety test

    a. High-rise building b. Building inside

    c. High smoke stack d. Chemical plant

    f. Cultural property g. Wind power generator

    Table 2 is an illustration of diversified structures [5]. a. At

    the time of constructing high-rise building, safety problem is

    required to be inspected and for outdated high-rise buildings,

    efficiency of service life extension is provided by detecting

    cracking and abnormal temperature by its deterioration, b. By

    detecting cracks of building inside, building safety is

    increased, c. By monitoring cracking and dangerous elements

    of cultural property, national waste could be reduced.

    Recently, due to frequent fire in chemical plants, safety is

    required in reality, d. f. By analysing, investigating cracking

    and emission gas in internal/external walls of plant smoke

    stack and chemical plants in real time, an advantage of being

    able to prevent an accident in advance is provided. In addition,

    site application for external cracks inspection through

    cinematography and internal cracks inspection through

    thermal infrared camera for the blades and tower of wind

    power generator that is popular as a renewable energy source

    will be performed and safety inspection manual for wind

    power generator is under the process of R & D.

    C. PTZ(Pan Tilt, Zoom) Camera

    Format and save your graphic images using a suitable

    graphics processing program that will allow you to create the

    images as PostScript (PS), Encapsulated PostScript (EPS), or

    Tagged Image File Format (TIFF), sizes them, and adjusts the

    resolution settings. If you created your source files in one of

    the following you will be able to submit the graphics without

    converting to a PS, EPS, or TIFF file: Microsoft Word,

    Microsoft PowerPoint, Microsoft Excel, or Portable

    Document Format (PDF). GWP is a scale of evaluating how

    much heating effect of gas of 1kg is for a certain period of

    time after greenhouse gas is emitted in the atmosphere when

    comparing it with carbon dioxide of 1kg. In case of assuming

    CO2 as 1 based on 100 years, CH4 is 21, NO2 310, HFCs

    1,300, PFCs 7,000 and SF6 23,900, respectively [3]. The

    location information of camera consists of the coordinates to

    represent the current location of moving objects and

    structures, the coordinates to represent the location of camera

    and the distance, height difference and angle between the

    objects.

    Fig. 1. Location Information of Camera

    Fig. 1 is the location information of camera.

    The location information of an object consists of the

    coordinates to represent the current location of a moving

    object, the coordinates to represent the location of a camera

    and the distance, height difference and angle between the

    objects. The location value of camera will not be changed

    once it is installed. The location of a moving object continues

    to change; thus, the distance, height difference and angle

    value between a camera and a moving object shall be

    calculated based on the pre-defined formula for the two

    coordinates.

    The moving object and angle determines the

    horizontal rotational direction of a camera, whereas the

    distance (d) between objects determines the enlargement and

    reduction magnification of a camera. In addition, the height

    difference of a camera determines the vertical rotational angle

    of a camera [6].

    It is required to control the operation of horizontal

    rotational angle, the vertical rotational angle and the

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 615

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • enlargement/reduction value for PTZ camera. [7]

    The operation signal of a camera requires a conversion

    between those coordinates and Cartesian coordinates. It is

    also necessary to have the coordinates of a moving

    object calculated on the orthogonal coordinate plane and the

    location coordinates of a camera . It is possible to

    obtain the distance difference between two points through

    Formula (1) by utilizing the two coordinates.

    (1)

    It is required to calculate the horizontal rotational angle of

    360 by using Formula (2) for 360 degree system by

    converting the reference coordinates into the polar

    coordinates that uses the location coordinates of a camera as

    the starting point.

    (2)

    Fig. 2. Scope of horizontal rotation

    The scope of horizontal rotational angle of a camera is

    .

    As for the vertical rotational angle of a camera , the

    height relative to the surface from the installation point of a

    camera is , whereas the height of a moving object is .

    They can be obtained through Formula (3).

    (3)

    Fig 3. Scope of vertical rotation

    The scope that the vertical rotational angle of a camera

    can have is .

    The reliability of operation control value of PTZ camera

    for the operation control of a camera will increase with a

    higher degree of accuracy for the process of obtaining the location of an object.

    III. CONTENTS AND METHOD OF STUDY

    There are various sizes, heights and shapes in relation to the

    structures. It is difficult for a small aircraft to approach at

    short ranges in terms of detecting crack or risk factors when

    accessing to a structure. PTZ camera is useful as a camera to

    be installed on a small aircraft to detect the location of cracks

    in a structure because it can be enlarged and also it is able to

    move to left and right. Moreover, such functions of PTZ

    camera as pan, tilt and zoom can be utilized in order to detect

    crack and risk factors when a subject is at a remote location.

    A. PTZ Module of Video Camera

    It is possible to examine in more detail a structure by

    conducting PTZ control of a video camera in order to conduct

    visual inspection of a structure that is hard to access from a

    short distance.

    It is possible to shoot a structure in a wide area with 355° at

    left and right and 120° at top and bottom of PTZ camera. It is

    also possible to recognize an object at up to 30M in dark

    nature or at night with the function of IR camera.

    The screen of PTZ camera is set at 200 million pixels. The

    problem associated with blind spot when conducting

    horizontal and vertical rotation and enlargement/reduction

    operation can be solved.

    Fig. 3. PTZ camera of video camera

    Fig. 3. shows PTZ camera that is able to detect high-rise

    buildings and places that cannot be detected by human eyes

    because it is equipped with a small aircraft.

    Fig. 4. Small aircraft equipped with multiple sensors

    Fig. 4. Shows a small aircraft equipped with multiple

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 616

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • sensors. It examines the safety inside and outside a structure

    through multiple sensors and video sensors.

    Fig. 5. Multiple sensor module embedded system

    Fig. 5. is the embedded module that processes and analyses

    the sensors of various types installed in a small aircraft.

    Currently, the research project that focuses on the

    transmission protocol and sensor data monitoring system to

    receive various signals is in progress based on the embedded

    system to receive the signals of sensors. At present, it is the

    monitoring system that measure carbon dioxide in the air

    using CO2 sensor and sends signals when the amount and

    proportion of carbon dioxide are high.

    Fig. 6. Structure safety inspection integrated management system based

    on a small aircraft

    Fig. 6. shows the structure safety inspection integrated

    management system based on a small aircraft. It consists of

    power supply unit, web server and Wi-Fi based wireless video

    transmission system to perform the function of storage server.

    It is the low-power video management server system based

    on an embedded system that combines, saves and manages

    multiple sensors and PTZ camera. As for videos, those videos

    transmitted in motion JPEG encoding are synchronized in

    accordance with the time. Upon request of users, the sensing

    data and videos are also synchronized and transmitted.

    B. Design of multiple monitoring system

    Multiple sensor monitoring system is a system for

    preventing occurrence of cracking and various dangerous

    situations due to diversified causes including deterioration or

    defective work of structures in advance. In addition, this

    system inspects data in the air in real time using unmanned

    flying vehicle and by using obtained data, monitors subject

    structure in real time.

    Multiple sensor monitoring system is mainly divided into

    small flying vehicle and embedded system. Small flying

    vehicle is an unmanned flight system that performs data

    detection and transmission in real time by using multiple

    sensor and embedded system receives data transmitted from

    small flying vehicle and processes received data in real time

    and at the time of risk occurrence, informs users of dangerous

    situation through smart phone.

    As embedded system that is data processing system is

    required to process data collected by heterogeneous multiple

    sensors based on processing module that may process data in

    real time with high speed and perform a function of

    processing images in real time at the same time, it was

    designed based on excellent performance. In addition, as

    sensors being used for multiple sensor monitoring system use

    diversified sensors including PTZ camera having a function

    of infrared ray, temperature, humidity sensors, it is required to

    use and provide diversified interfaces.

    Embedded system provides a function of acquiring,

    processing and transmitting various sensor data and

    controlling sensors by analysing instructions after receiving it

    and provides monitoring information of sensors so that status

    information of each sensor could be observed remotely. At the

    same time, in order to synchronize data collected by each

    sensor, it provides a separate function and a process of storage,

    transmission processing of sensor data is required.

    C. Structure of Multiple Sensor Monitoring System

    The whole configuration diagram of the system proposed in

    this paper is shown on figure 7.

    Fig. 7. System Configuration Diagram

    As main function of multiple sensor monitoring system is

    that the functions such as high speed input/output processing

    of various sensors, real time synchronization of sensing data,

    transmission of processed data are required to be performed at

    the same time, real time monitoring is required. By flight of

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 617

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • small flying vehicle, each sensor starts to be operated and at

    this time, storage of sensing data and its transmission module

    are required. In addition, this system was designed to transmit

    and store collected data in big data storage device and process

    stored data after the flight is finished.

    Each module of multiple sensor monitoring system was

    designed to perform each function that is required to be

    provided by data processing system. In order to process image

    data of PTZ camera, compression module is provided and for

    data synchronization of various sensors, synchronized module

    and transmission module for transmitting data in real time are

    provided. In addition, in order to process input/output of

    diversified sensors being connected through each interface,

    temporary storage space was provided. These modules

    provide informing and monitoring system function through

    smart phone by it being implemented in parallel.

    IV. SENSOR CONTROL AND DATA PROCESSING

    A. Sensor Control

    Multiple sensor monitoring system provides real time

    control function to multiple sensors. As this system uses

    operating small flying vehicle and commanding embedded

    system, multiple sensor monitoring system provides control

    function to diversified sensors. This system controls sensors

    by transmitting instructions to sensor that is desired to be

    controlled and using data processing system that analyses

    transmitted instructions.

    B. Data Processing

    In multiple sensors monitoring system, sensing data

    collected by each sensor is processed in real time and

    transmitted to embedded system. However, as transmission

    rate of transmission route being used at the time of

    transmission by embedded system is limited, in order to

    transmit big data, a process of compressing sensing data is

    required. In particular, as image data being collected by

    camera is big data, its compression process is essential and as

    compressed image data is also unable to be transmitted at one

    time, it is required to be transmitted to embedded system by

    dividing it into transmissible packet by using a separate

    transmission format. In addition, as data of each sensor is

    required to be transmitted by division at the time of

    transmitting sensing data, transmission format is required to

    be indicated with tag matching with each sensor. At the same

    time, tag of sensing data based on time synchronization is

    required to be included.

    C. Video of PTZ Camera

    It is required to fly a small aircraft and transmit the

    operation of multiple sensors and the data of PTZ camera to

    the integrated management system. The transmitted data can

    be verified through the monitor screen. It is possible to

    confirm the location immediately through GPS sensor and

    detect the crack and risk factors of a structure.

    Fig. 8. Structure inspection of small aircraft

    Fig. 8. shows how a small aircraft inspects a structure.

    a b

    c d

    Fig. 9. Cracked wall surface taken by a small aircraft

    Fig. 9. is the conventional figure taken by PTZ camera of a

    small aircraft. b is the enlarged version by 2x zoom. c and d

    are the enlarged versions by 3x zoom. PTZ camera allows us

    to take pictures of wall surfaces located at a high-rise building

    and check them accurately and specifically.

    V. EXPERIMENTAL RESULT

    It is difficult to visually confirm the crack and risk of high

    rise buildings and high structures. They can be identified

    using PTZ camera equipped on a small flying object. In the

    existing method, the person may face with dangerous situation

    as the person should climb directly to the high rise building.

    With a small flying object, however, the location of cracks

    can be safely identified.

    The places where the experiment was performed with a

    small flying object are the inside and outside of building 3 at

    the department of engineering, Sunchon University. And the experiments were performed 6 times. Even though the video

    was out of focuses by the shake during video shooting,

    relatively stable video could be acquired. 4 videos out of 6

    were accurate and the location of crack were accurately

    identified with GIS sensor

    Table 3 shows the result of experiment with a small flying

    object

    TABLE 3 result of experiment with a small flying object

    Number of experiment Video acquired Video accuracy

    6 times 4 88%

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 618

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • VI. CONCLUSION

    At present, a lot of small flying vehicles are applied,

    researched and developed in various fields including shooting

    site of TV program such as entertainment and documentary,

    patrol purpose for safety control, exploration purpose for

    roving Mars and other purpose of diversified specificities.

    This study is being progressed by using small flying

    vehicle for safety inspection of structures. By using small

    flying vehicle for safety inspection of structures, development

    process that may collect, store, transmit and process multiple

    sensor data of multiple sensor monitoring system was

    explained. In multiple sensors monitoring system, modules

    for high speed input/output processing, real time sensor data

    synchronization, compression, and transmission of data were

    designed.

    This thesis focused on the use of a small aircraft for the

    safety inspection of a structure. This thesis described the

    multiple sensors and PTZ camera for the structure safety

    inspection. Also, it described the structure safety inspection

    integrated management system based on a small aircraft,

    which can collect, save, transmit and process data. As for the

    multiple sensors monitoring system, such modules as

    high-speed input/output processing, real-time sensor data

    synchronization, data compression and transmission were

    designed.

    In the future study, a system that may increase utilization

    accuracy of various sensors through diversified direct tests by

    using various sensors and prevent structural cracking and

    dangerous situations in advance through analysis of image

    data being transmitted from PTZ and thermal infrared camera

    is scheduled to be researched.

    It is expected that based on this system, various structures

    would be free from the danger of fire, disaster and

    deterioration and its high-levelled safety would be maintained

    with reasonable coast.

    ACKNOWLEDGMENT

    “This research was financially supported by the Ministry

    of Education (MOE) and National Research Foundation of

    Korea (NRF) through the Human Resource Training Project

    for Regional Innovation (No. 2014H1B8A2032217).”

    REFERENCES

    [1] Y. S. Bae1, J. S. Kim1, #J. S. Bae. Development of Measuring Multiple Sensor Modules for Yellow Dust & Co.”, Korean Society for Precision Engineering, Spring Leaders` Forum 2011, pp. 487-488, may,

    2011

    [2] Jonghyuk LeeO , Hyunwoo Joe, Euteum Jo, Hyungshin Kim,

    “Development of Multi-Sensor Data Processing System for Unmanned Aerial Vehicle”, Korea Computger Congress 2009., Vol 36, No. 1(B).,

    502-506, 2009

    [3] Chang-Keun Ryu, Chan-Bang Park A Novel Clustering Method with

    Time Interval for Context Inference based on the Multi-sensor Data Fusion , The journal of The Korea institute of Electronic Communication Sciences2013. 3.22 #9, 3

    [4] ko.wikipedia.org

    [5] https://www.google.co.kr/imghp?hl=ko&tab=wi&ei=9IrPUrijJYOAl

    QXjzoGgAQ&ved=0CAQQqi4oAg

    [6] Korea Electronics Technology Institute, “CCTV Market Trends and Outlook”, 2011.

    [7] C . Micheloni and G. L. Foresti, “Zoom on Target While Tracking”, IEEE International Conference on Image Processing, 2005.

    Mi-Jeong Park Mi-Jeong Park received the B.S. degree from

    Korea , Gwangju University, Gwangju, Korea, in

    2004, She is M.S degree from department of

    computer science, Sunchon National University,

    Korea, in 2012, She is currently a Ph.D. student in

    computer science at the Sunchon National

    University, Korea, Her current research interests

    include augmented reality, image processing,

    computer graphics.

    Eung-kon Kim Eung-kon Kim received the B.S. degree from

    Chosun University, Gwangju,, Korea, in 1980, his

    M.S degree from department of electronics,

    Hanyang University, Seoul, Korea, in 1987, his

    Ph.D. degree from Chosun University, Gwangju,

    Korea, in 1992. His current research interests are

    computer vision, virtual/augmented reality, image

    processing, and computer graphics. Currently he is

    a professor in department of computer engineering,

    Sunchon National University, Korea.

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 619

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

  • Abstract— A Multi-hop relay communication system has

    gained tremendous attention recently as it reduces capital investment for expansion of coverage area. In this work, an adaptive cooperative decode-and-forward (DF) protocol was developed to enhance the performance of the system. In particular, a ‘best destination relay selection’ approach (BDRS) was proposed to achieve high diversity gain. The approach starts by selecting a destination node with the maximum channel gain first, and then selecting a relay node with the minimum outage probability afterwards. Closed-form expressions for the outage probability, which is a measure of system performance, were derived. Their validity was checked by comparing the calculated results with the simulated results from MATLAB software. Both results were found to be almost identical. Simulated outage probability of the proposed protocol was also found to be many folds lower than those of conventional and modified multi-hop communication protocols. Lastly, an optimum power allocation scheme was applied to further minimize outage probability.

    Keyword—Cooperative Communications, Multi-hop, Relay Selection, and Routing Strategy.

    I. INTRODUCTION

    ULTI-HOP relay communication has become more and more important for the new generation of wireless

    communication system. It helps expanding service areas, increasing system capacity, and reducing the investment budget for base station expansion. The basic idea of radio relaying [1] is to use a relay node to process base station signal and send them out to another relay or destination node. Multi-hop relaying can expand cell coverage and reduce dead communication spots. Relays can take up some of the traffic load when the full capacity of the base station has been reached.

    ———————————————————————

    Manuscript received October 29, 2014. This work was financially supported by TOT Public Company Ltd., Thailand.

    Smich Butcharoen is a PhD. candidate at The Sirindhorn International Thai-German Graduate School of Engineering, King Mongkut’s University of

    Technology North Bangkok ([email protected]). Assistant Professor Dr.Chaiyod Pirak is a supervisor at Mobile

    Communications and Embedded Systems Laboratory, The Sirindhorn International Thai-German Graduate School of Engineering, King Mongkut’s University of Technology North Bangkok (corresponding author phone: +6625552000 ext. 2929 ; fax:+6625552937; e-mail: [email protected]).

    Radio relaying saves the terminal’s transmitting power, which in turn prolong battery life.

    The relay-based architecture, its cooperation diversity, and cooperative multipath technology have already been implemented worldwide. All of the standards for existing and near future mobile communications systems—e.g., The 3rd Generation Partnership Project (3GPP) [2] and broadband wireless network (IEEE 802.16j) [3]—rely on the concept of relaying. A new project, the Wireless World Initiative New Radio (WINNER) project has planned out in detail an implementation of a ubiquitous broadband mobile radio relaying system.

    For a small relaying system of one relay and one destination, there is only one possible route from source to destination. However, in a large relaying network (e.g., wireless sensor network), there are many relays between the source and the destination. A key question is which relay node should be selected to forward the information. One of the relay selection techniques is to simply pick the ‘best’ of all available relays for two hops and using that relay to decode and forward the information. In [4], the authors present a selection criterion of

    𝜂𝑙 = min [|ℎ𝑆,𝑅𝑙|2

    , |ℎ𝑅𝑙,𝐷|2

    ] and an alternative ‘smoothed-out’

    version of 𝜂𝑙 = 2/ (1

    |ℎ𝑆,𝑅𝑙|2 +

    1

    |ℎ𝑅𝑙,𝐷|2), where ℎ𝑆,𝑅𝑙 is the

    channel impulse response between the source (S) and relay (𝑅𝑙), ℎ𝑅𝑙,𝐷 is the channel impulse response between relay 𝑅𝑙 and destination (D), and l = 1, 2,..., L. The relay node with the ‘best’ channel that produces the highest 𝜂𝑙 is selected to retransmit the signal. This selection criterion helps avoid system bottleneck, but it might not be optimum. Another simple way to find a suitable route is by following the conventional protocol. In this protocol, the system selects the best relay that exhibits the maximum received signal to noise ratio (SNR) for each hop on a hop-by-hop basis. Yet, there is a problem with the last hop since there is no alternative route to the final destination. To solve this problem, the authors of [5] proposed an ad-hoc routing strategy–joint selection for the last two hops. We call this technique ‘modified conventional multi-hop strategy’. This strategy is easy to implement but its performance can still be improved. We describe it in details in system model B.

    In [6], the best relay selection based on the technique of minimum outage route (MOR) was proposed. The authors assumed that each relay node can receive information from the

    An Adaptive Cooperative Protocol for Multi-Hop Wireless Networks

    Smich Butcharoen, Chaiyod Pirak The Sirindhorn International Thai-German Graduate School of Engineering (TGGS),

    King Mongkut's University of Technology North Bangkok, Bangkok, Thailand

    [email protected], [email protected]

    M

    ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 3, May 2015 620

    Copyright ⓒ 2015 GiRI (Global IT Research Institute)

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]

  • nodes of two previous hops and combine their signals using a cooperative protocol. This assumption corresponds to a diversity of two transmitting nodes. The performance of such a system is superior to that of the system described in [5]. Nonetheless, the system performance is still not optimum with respect to the outage probability.

    In contrast to the dual-hop transmission in [6], the authors in [7] analyzed transmission by multiple relays, where every relay retransmits the signal from the source to the destination. They found that the outage probability was not reduced by much as the number of relays increased. In fact, in some instances, more relays increased the outage probability. On the one hand, increasing the number of relay nodes increases the possibility that a successful relaying can occur, which increases the mutual information between the source and destination. On the other hand, increasing the number of relay nodes increases the probability of outage condition at the relay and destination nodes. This trade-off is a result of the time-division channel allocation scheme that allows proportionally less time for the source to transmit its signal when the number of relay nodes is increasing, i.e., the source is allowed to transmit only a fraction of 1/(m+1) of the time, where m is the number of relays. Hence, an optimal number of relay nodes exists, and it could be determined based on the SNR and channel conditions. Similar to the model in [7], in [8], the authors investigated a model of two-hop transmission with a cooperative protocol and introduced a strategy of selecting the best relay based on the received SNR and channel quality instead of that of using all relays at a reduced power in [7]. They also derived the model’s outage probability. Their result showed a better performance than that of [7]. In [7], the multiple relays could not reduce the outage probability significantly, but the best relay selection in [8] was very different–a larger number of relays resulted in a much higher reduction of outage probability.

    In [9], for the purpose of further improvement of the system performance realized in [8], the authors applied a cooperative protocol with Alamouti-coding scheme but still used the best relay selection technique proposed in [8] to their system of two-hop transmission with one source, one destination, and two candidate relays. After the best relay was selected from time to time, four time slots were used to transmit two symbols, following the Alamouti-coding scheme; therefore, the system lost some bandwidth efficiency. To compensate, the authors employed Quadrature Phase Shift Keying (QPSK) modulation. They also derived an expression for the system’s outage probability. Their simulation results showed that their system performed better than that in [8] by 1.5 dB at an SNR higher than 20 dB.

    In [10], the authors considered a linear network model of a multi-hop relay communication system consisting of a source, a destination, and several relays equipped with multiple antennas. They did not focus on the direct link from the source to the destination within the same cluster. Distributed space-time coding was used to maximize diversity gain. In their discussion, the answer to whether to code a multi-hop relay channel in space or time was that it depends on the available resources such as availability of feedback, decoding

    complexity, and various requirements of wireless application such as rate, latency, etc.

    In this paper, we could not compare our results with those in [10] even though we used a linear network model similar to theirs because their relays were equipped with 2 antennas while ours had only one. Similarly, the cooperative protocol in [6], [7], [8], and [9] could not be compared to ours either because their systems consisted of only two hops while ours consisted of more than two hops, similar to those of [4] and [5]. In reality, multi-hop communication uses many hops and relays in each hop. When a cooperative protocol is applied, there are many candidate relays and candidate destinations in each cluster. There has never been proposed a selection strategy that gives the highest priority to the destination. That was the motivation for this research. Our reason was that the destination of every two hops is the source of the next hop, and we wanted the best source for the next hop, so it was sensible to give the best destination the highest priority. We named our proposed protocol the ‘best destination relay selection (BDRS)’

    approach. We also derived a closed-form expression of the outage probability of our system. To validate it, we compared the calculated results against the simulated ones. We also evaluated our system performance against the modified conventional multi-hop strategy employed in [5]. Finally, we further improved our system performance by employing optimum power allocation for source (S) and relay (R). The results were very interesting. The system tried their best to maintain the S-D link by allocating more power to the source, even when the quality of the transmission link was poor. This finding confirmed that selecting the best destination node first has a tremendous impact on the system’s performance.

    The rest of this paper is organized as follows: in section II, models of the wireless communication system used in this study is described; in section III, a closed-form outage probability of our system is derived; in section IV, the simulated and calculated results are discussed; in section V, the optimum power allocation scheme and results are discussed; in section VI, the expected real-world implementation issues are considered; and section VII is the conclusion of this paper.

    Fig. 1. A multi-hop communication


Recommended