Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 15, Issue 12 - Dec 1990
Volume 15, Issue 11 - Nov 1990
Volume 15, Issue 10 - Oct 1990
Volume 15, Issue 9 - Sep 1990
Volume 15, Issue 8 - Aug 1990
Volume 15, Issue 7 - Jul 1990
Volume 15, Issue 6 - Jun 1990
Volume 15, Issue 5 - May 1990
Volume 15, Issue 4 - Apr 1990
Volume 15, Issue 3 - Mar 1990
Volume 15, Issue 2 - Feb 1990
Volume 15, Issue 1 - Jan 1990
Selecting the target year
A Study of Restoration and Feature Extraction
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 535~544
In this paper, we represent the restoration and feature extraction of fingerprint image. The purpose of restoration of fingerprint image are to com pensate distortion which is affected by noise and to preserve various features of fingerprint image. To extracte the central point of fingerprint, we used sample matrix, and restore fingerprint, we used direction in formation of thinned image and the gray scale of the original images.
A Study of Model on File Transfer Using Public-key Cryptography
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 545~552
This paper is concerned with the file protection in the file transfer systems. In the existing file transfer systems, passwords are used in the protection but do not provide any data protection and can only provide some protection against unauthorized access. Even provided with this protection, we cannot be free form computer hackers. In order to achieve higher standards of protection for our privacy (protection for data themselves, authentication of senders...) analternative technical system should be developed in using of pulic key cryptography by choosing the public key method (RSA public key) in the file transfer. A new system suggested in the paper can achieve some higher standards of protection for our privacy. We a result thie system will be easily applied to various document handling systems as in the data base.
An efficient parallel solution algorithm on the linear second-order partial differential equations with large sparse matrix being based on the block cyclic reduction technique
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 553~564
The co-efficient matrix of linear second-order partial differential equations in the general form is partitioned with (n-1)x(n-1) submartices and is transformed into the block tridiagonal system. Then the cyclic odd-even reduction technique is applied to this system with the large-grain data granularity and the block cyclic reduction algorithm to solve unknown vectors of this system is created. But this block cyclic reduction technique is not suitable for the parallel processing system because of its parallelism chanigng at every computing stages. So a new algorithm for solving linear second-order partical differential equations is presentes by the block cyclic reduction technique which is modified in order to keep its parallelism constant, and to reduce gteatly its execution time. Both of these algoriths are compared and studied.
Predetection Filtering Effect of GMSK with Discriminator Detection in Rayleigh Fading Channel
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 565~573
In this paper, optimum bandwidth at BbT=0.25 was simulated uisng the formular of S.Elnoubi, who analyzed effect of receiving bandpass filter of discriminator type GMSK modem under static and fast Rayleigh fading channel which is applicable to land mobile channel environment, and measured with experimental system. The experimental results were well agreed with the simulation. The result shows that filter bandwidth is optimal at BrT=0.7 under static fading(fDT=0), while the performance is less sensitive to the bandwidth as Eb/No and fading rate fDT bacome higher.
A Study on the Environment and Stategies of End-User Computing
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 574~580
Recently End-User Computing(EUC) is emerging as an alternative to the traditional information systems development approach which cannot cope with users' requirements of systems development because of increase in backlog. It is necessary that appropriate models of EUC to evaluate the expected benefits and risks and to implement should be developed for managers. The main objective of this study is to help managers who need to review their MIS policies by presentinb EUC strategies under the information systems research framework which have concluded through many studies.
A Study of Rotating Machine Using Bispetrum Analysis Method
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 581~601
A variety of method to diagnose the fault of rotational mechine is suggested, the latest data. This paper uses Bispectrum which is sort of high order spectrum, diagnose the ball bearing of the rotational machine element. Apprehending the physical meaning of Bispectrum, computer simulation is performed. The result from computer simulation and the signal of the faulted ball bearing is studied from all it's aspects. It is found that the Bispectrum is more effective than the conventional Power Spectrum.
Performance Analysis of ISDN D-Channel Access Protocol
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 602~617
In this paper, we analyze the performance of D-channel access protocol at the S-reference point for the ISDN user network interface recommended by CCITT. For the case of multipoint access to D-channel, a queueing model of D-channel access protocol is proposed. The delay is analyzed by decomposing it into waiting queue delay and contention delay. The contention delay is decomposed further into vain contention delay and pure contention delay so the analysis of the priority queueing system with symmetrical and asymmetrical arrival rates may be applied. The numerical results obtained are compared with the results of the single station queueing system served by the non-preemptive priority.
Separation of Subpatern and Recognition of Hanguel Patterns by Analysis of Feature of Contacting Phonemes
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 618~627
In this paper a new algorithm for separation of contacting subpattern and connective feature extraction of strokes is proposed. This algorithm is able to classification of the type of contacting parts, connective feature extreaction of strokes, separate the phoneme of contacting parts between strokes, classify the character types by feature classification of connecting parts and analysis of connecting attribute. Also, shape normalize into formal patterns and decide on the input pattern from position value of bending feature of this normalized shape and make an recognition experiment by neural network using BEP learining algorithm. This algorithm represents the good achievement ratio by separation of phoneme, classification of character type, connective feature extraction of stroke and recognition experiment.
A Study on the IC, Implementation of High Speed Multiplier for Real Time Digital Signal Processing
The Journal of Korean Institute of Communications and Information Sciences, volume 15, issue 7, 1990, Pages 628~637
In this paper we present on architecture for a high sppeed CMOS multiplier which can be used for real-time digital signal processing. And a synthesis method for designing highly parallel algorithms in VLSI is presented. A parallel multiplier design based on the modified Booth's algorithms and Ling's algorthm. This paper addresses the design of multiplier capable of accpting data in 2's complement notation and coefficients in 2's complement notation. Multiplier consists of an interative array of sequential cells, and are well suited to VLSI implementation as a results of their modularity and regularity. Booth's decoders can be fully tested using a relatively small number af test vector.