Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of information and communication convergence engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 1, Issue 4 - Dec 2003
Volume 1, Issue 3 - Sep 2003
Volume 1, Issue 2 - Jun 2003
Volume 1, Issue 1 - Mar 2003
Selecting the target year
Design and simulation of high performance computer architecture using holographic data storage system for database and multimedia workloads
Na, Jong-Whoa ; Ryu, Dae-Hyun ; Kim, Jung-Tae ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 169~173
The performance of modern mainframe computers keeps increasing due to the advances in the semiconductor technology. However, the quest for the faster computer has never been satisfied. To overcome the discrepancy in the supply and demand, we studied a high performance computer architecture utilizing a three-dimensional Holographic Data Storage Systems (HDSS) as a secondary storage system. The HDSS can achieve a high storage density by utilizing the third dimension. Furthermore, the HDSS can exploit the parallelism by processing the two-dimensional data in a single step. To compare the performance of the HDSS with the conventional hard disk based storage system, we modeled the HDSS using the DiskSim simulation engine and performed the simulation study. Results showed that the HDSS can improve the access time by 1.7 times.
Application of Fuzzy Logic to Smart Decision of Smart Sensor System
Pham, Van-Su ; Linh Mai ; Giwan Yoon ; Kim, Dong-Hyun ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 174~176
This paper considers the application of Fuzzy Logic to Smart Decision process of Smart Sensor system that interprets and response to the change of environmental parameters. The considered system consists of three sensors: temperature sensor, humidity sensor and pressure sensor. The smartness of system is constituted by the applying of Fuzzy Logic. The paper discusses the technical details of the application of Fuzzy Logic for making the system to be smarter.
A Implementation of Simple Convolution Decoder Using a Temporal Neural Networks
Chung, Hee-Tae ; Kim, Kyung-Hun ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 177~182
Conventional multilayer feedforward artificial neural networks are very effective in dealing with spatial problems. To deal with problems with time dependency, some kinds of memory have to be built in the processing algorithm. In this paper we show how the newly proposed Serial Input Neuron (SIN) convolutional decoders can be derived. As an example, we derive the SIN decoder for rate code with constraint length 3. The SIN is tested in Gaussian channel and the results are compared to the results of the optimal Viterbi decoder. A SIN approach to decode convolutional codes is presented. No supervision is required. The decoder lends itself to pleasing implementations in hardware and processing codes with high speed in a time. However, the speed of the current circuits may set limits to the codes used. With increasing speeds of the circuits in the future, the proposed technique may become a tempting choice for decoding convolutional coding with long constraint lengths.
Wireless LAN Security Solutions for Secure Wireless Communications
Kim, Su-Yong ; Ahn, Duck-Ki ; Roh, Jae-Sung ; Oh, Chang-Reon ; Cho, Sung-Joon ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 183~188
generation mobile communications, through several radio access networks such as WLAN, Bluetooth, UMTS, GPRS, CDMA 1X, and IMT-2000 in the same area offering different type of coverage, will support interactive multimedia services in additions to wider bandwidths, higher bit rates, and service portability. Regardless of various radio access networks, they will also support robust security mechanisms, as well as seamless mobility and common authentication. In this paper, we give an overview of WLAN security and examine its security problems. We also explain the enhanced security schemes, such as port-based authentication, EAP, and IEEE 802.1X. For secure wireless communications, several possible security solutions are offered and evaluated in various respects to improve WLAN security. This paper will make a contribution to provide more secure wireless communications to cellular operators embracing WLAN technology as a means to generate new revenues based on data services.
A Fast Algorithm for Real-time Adaptive Notch Filtering
Kim, Haeng-Gihl ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 189~193
A new algorithm is presented for adaptive notch filtering of narrow band or sine signals for embedded among broad band noise. The notch filter is implemented as a constrained infinite impulse response filter with a minimal number of parameters, Based on the recursive prediction error (RPE) method, the algorithm has the advantages of the fast convergence, accurate results and initial estimate of filter coefficient and its covariance is revealed. A convergence criterion is also developed. By using the information of the noise-to-signal power, the algorithm can self-adjust its initial filter coefficient estimate and its covariance to ensure convergence.
A MAC Protocol Mechanism for Mobile IP over Wireless LANs
Moon, Il-Young ; Roh, Jae-Sung ; Cho, Sung-Joon ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 194~198
Recently, the use of TCP/IP protocols over wireless LANs poses significant problems. In this paper, we have analyzed transmission control protocol (TCP) packet transmission time for mobile IP over wireless local area networks (LANs) using a proposed a new random backoff scheme. We call it as a proxy backoff scheme. It is considered the transmission time of TCP packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) channel. From the results, a proposed proxy backoff scheme produces a better performance than an original random backoff in mobile IP over wireless LANs environment. Also, in OFDM/quadrature phase shift keying (QPSK) medium access control (MAC), we have obtained that the transmission time in wireless channel decreases as the TCP packet size increases.
Resonance Characteristic Improvement of ZnO-Based FBAR Devices Fabricated on Thermally Annealed Bragg Reflectors
Yim, Mun-Hyuk ; Kim, Dong-Hyun ; Linh Mai ; Giwan Yoon ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 199~204
In this paper, we present the thermal annealing effects of the W/
multi-layer reflectors in ZnO-based FBAR devices with cobalt (Co) electrodes in comparison with those with aluminum (Al) electrodes. Various thermal annealing conditions have been implemented on the W/
multi-layer reflectors formed on p-type (100) silicon substrates. The resonance characteristics could be significantly improved due to the thermal annealing and were observed to depend strongly on the annealing conditions applied to the reflectors. Particularly, the FBAR devices with the W/
multi- layer reflectors annealed at
/30min have shown superior resonance characteristics in terms of return loss and quality-factor (Q-factor). In addition, the use of Co electrodes has resulted in further improvement of the resonance characteristics as compared with the Al electrodes. As a result, the combined use of both the thermal annealing and Co electrodes seems very useful to more effectively improve the resonance characteristics of the FBAR devices with the W/
Robust Entropy Based Voice Activity Detection Using Parameter Reconstruction in Noisy Environment
Han, Hag-Yong ; Lee, Kwang-Seok ; Koh, Si-Young ; Hur, Kang-In ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 205~208
Voice activity detection is a important problem in the speech recognition and speech communication. This paper introduces new feature parameter which are reconstructed by spectral entropy of information theory for robust voice activity detection in the noise environment, then analyzes and compares it with energy method of voice activity detection and performance. In experiments, we confirmed that spectral entropy and its reconstructed parameter are superior than the energy method for robust voice activity detection in the various noise environment.
Parts-Based Feature Extraction of Spectrum of Speech Signal Using Non-Negative Matrix Factorization
Park, Jeong-Won ; Kim, Chang-Keun ; Lee, Kwang-Seok ; Koh, Si-Young ; Hur, Kang-In ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 209~212
In this paper, we proposed new speech feature parameter through parts-based feature extraction of speech spectrum using Non-Negative Matrix Factorization (NMF). NMF can effectively reduce dimension for multi-dimensional data through matrix factorization under the non-negativity constraints, and dimensionally reduced data should be presented parts-based features of input data. For speech feature extraction, we applied Mel-scaled filter bank outputs to inputs of NMF, than used outputs of NMF for inputs of speech recognizer. From recognition experiment result, we could confirm that proposed feature parameter is superior in recognition performance than mel frequency cepstral coefficient (MFCC) that is used generally.
Analyses of Crypto Module for Gbps VPN System
Kim, Jung-Tae ; Han, Jong-Wook ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 213~216
A VPN is widely used in a communications environment which access is controlled to permit peer connections only within a defined community of interest. It is constructed through some form of partitioning of a common underlying communication medium, where this underlying communications medium provides services to the network on a non-exclusive basis. In this paper, we have analyzed a variety of architecture to implement Giga bps VPN system. The proposed architecture will satisfy the needs of clients who adopt Giga bps VPN system in the various environments.
A study on Generalized Synchronization in Hyper-Chaos with SC-CNN
Bae, Young-Chul ; Kim, Ju-Wan ; Song, Hag-Hyun ; Kim, Yoon-Ho ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 217~222
In this paper, we introduce a hyper-chaos synchronization method using hyper-chaos circuit consist of State-Controlled Cellular Neural Network (SC-CNN). We make a hyper-chaos circuit using SC-CNN with the n-double scroll. A hyper-chaos circuit is created by applying identical n-double scroll or non-identical n-double scroll and Chua's oscillator with weak coupled method to each cell. Hyper-chaos synchronization was achieved using GS(Generalized Synchronization) method between the transmitter and receiver about each state variable in the SC-CNN.
A study on Secure Communication in Hyper-Chaos with SC-CNN using Embedding Method
Bae, Young-Chul ; Kim, Ju-Wan ; Song, Hag-Hyun ; Kim, Yoon-Ho ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 223~228
In this paper, we introduce a hyper-chaos secure communication method using hyper-chaos circuit onsist of State-Controlled Cellular Neural Network SC-CNN). We make a hyper-chaos circuit using SC-CNN with the n-double scroll or Chua's oscillator. A hyper-chaos circuit is created by applying identical n-double scroll or non-identical n-double scroll and Chua's oscillator with weak coupled method to each cell. Hyper-chaos ynchronization was achieved using GS (Generalized Synchronization) method between the transmitter and receiver about each state variable in the SC-CNN. In order to secure communication, we have synthesizing the desired information with a hyper-chaos circuit by adding the information signal to the hyper-chaos signal using the SC-CNN in the transmitter. And then, transmitting the synthesized signal to the ideal channel, we confirm secure communication by separating the information signal and the hyper-chaos signal in the receiver.
Novel Design of Ultrashort Pulse Excimer Laser Amplifier System II (Temporal Gain Control and Phase Distortion/ASE Characteristics)
Lee, Young-Woo ;
Journal of information and communication convergence engineering, volume 1, issue 4, 2003, Pages 228~232
The previous design work for very large final amplifier pumped by electron beam module was described from the point of view of energy characteristics. In this work, the design problems for phase front distortion, ASE, and gain control in large aperture amplifier are presented in detail.