Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 17, Issue 12 - Dec 1992
Volume 17, Issue 11 - Nov 1992
Volume 17, Issue 10 - Oct 1992
Volume 17, Issue 9 - Sep 1992
Volume 17, Issue 8 - Aug 1992
Volume 17, Issue 7 - Jul 1992
Volume 17, Issue 6 - Jun 1992
Volume 17, Issue 5 - May 1992
Volume 17, Issue 4 - Apr 1992
Volume 17, Issue 3 - Mar 1992
Volume 17, Issue 2 - Feb 1992
Volume 17, Issue 1 - Jan 1992
Selecting the target year
Object Recognition using Neural Network
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 197~205
In this paper object recognition using neural network is studied. The recognition is accomplished by matching linear line segments which are formed by local features extracted from the curvature points. Since there is similarities among segments. The boundary of models is not distinct in feature space. Due to these indistinctness the ambiguity of recognition occurs, and the recognition rate becomes degraded according to the limitation of boundary decision capability of neural network for similar of features. Object recognition and to improve recognition rate. Local features are used to represent the object effectively. The validity of the object recognition system is demonstrated by experiments for the occluded and varied objects.
A Study on Public Key Cryptosystem for Computer Communication Networks
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 206~212
In this paper, a public key cryptosystem for security in computer communication networks is proposed. This is based on the security to a difficulty of factorization. For the proposed public key polynomials and the random intergers, then the ciphertext is computed. The security of proposed public key knapsack cryptosystem is verified with digital simulation.
On the Lower Level Laplacian Pyramid Image Coding Using Vector Quantization
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 213~224
An encoding technique based on region splitting and vector quantization is proposed for the lower level Laplacian pyramid images. The lower level Laplacian pyramid images have lower variance than higher levels but a great influence on compression ration due to large spatial area. And so from data compression viewpoint, we subdivide them with variance thresholding into two regions such as one called : flat region” and the other “edge region”, and encode the flat region with its mean value and the edge region as vector quantization method. The edge region can be reproduced faithfully and significant improvement on compression ratio can be accomplished with a little degradation of PSNR in spite of the effect of large flat region since the codebook used is generated from the edge region only on from the entire image including the flat region. It can be verified by computer simulation results that proposed method is more efficient in compression ratio and processing time than the conventional encoding technique of vector quantization
Performance Analysis of Virtual Circuit Services Using Open Queuing Network Models
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 225~231
In this paper, queuing networks with open chains are considerd to analyze the performance of packet switching networks. Networks are classified into backbone and local access networks. Networks for performance analysis are distributed to twelve regions and DNS is the backbone. Analysis was conducted using the real values from the input to existing networks and mathematical estimation values. As the result of analysis, the mean of end-to-and delay for each chain was presented. Except special regions, we found that there was a little difference between real values and mathematical estimation values. However, there could be a performance problem in total networks due to the increase of communication volumes in each region. So we proposed some solutions to this problem.
Analysis of the excess MSE of the individual tap LMS(ITLMS) equalizer
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 232~239
In this paper, an analytical expression of the excess MSE of ITLMS(Individual Tap LMS) which results from the random fluctuation of the distance between the actual and optimal coefficients due to noisy gradient estimates, is derived. The expression reveals that the excess MSE of the ITLMS algorithm is smaller that that of the LMS algorithm. The performance of the algorithm from the computer simulation for a fading time-dispersive channel verifies the theoretical results.
On the Improvement of Error Performance in the Differential Detector for 3-h CPM
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 240~246
In the paper, the differential detection techniques of 3-h CPM signals whose modulation index is varied periodically are proposed and their error performances are analyzed. We select the modulation index sets which are proper to the differential detection and propose the differential detectors which detect symbol with 3 bits per smapling period of 3T and detect a bit per sampling period of T. Applying the nonredundant error correction circuit and viterbi algorithm to differential detection of 3-h CPM. We ascertain the error performances are improved.
H/W Design and Implementations of the Wideband Data Processing system for the AMPS
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 247~259
In this paper, the types of the data exchange between a cell site and a cobile phonefor the call processing on the AMPS(Advanced Mobile Phone Service) are investigated, and the circuit for processing the wideband data stream according to the data types is designed and implemented. The circuit for detecting the Busy / Idle bit which is needed for determining the channel access, the circuit for detecting the word sync and the circuit for transmitting and receiving the wideband data is designed. The 3-out-of-5 majority vote of the 5received data is performed to reduce error and an algorithm requiring a small buffer size for real time processing of voting process is proposed. The method to overcome the computational complexity and the real time constraint of the conventional BCH decoding is proposed.
Performance Analysis of FH/MFSK systems with Fading and Multitone Jamming using Time Diversity
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 260~267
In this paper, the performance of frequency hopped(FH) M-ary frequency shift keyed(MFSK)system is analyzed with the fading channel and the multione famming. In general, the performance degradation of FH/MFSK system is due to the Rayleigh fading and the multitone jamming environment. In order to improve the system performance. the time diversity is used. When the time diversity is applied to the Rayleigh fading and the mulitone jamming, we get around 18dB and 19dB improvements. respectively. And when it is applied to both the Rayleigh fading and the multitone jamming, we get around 4 dB improvement.
Discrimination of Unknown Digitally Modulated Signals
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 268~276
In this paper, we present an discrimination method of unknown digital modulated signals in noisy communication environment. We propose the use of an identification procedure based on time domain signal parameters. First, We extract instantaneous envelope. Frequency and difference phase as the basic feature informations from received signals. In order to identify signals using the extracted feature informations, we design the two dimensional feature space. The extracted feature infomations are mapped into2Dfeature space using 2D feature points. The procedure has been tested by simulations on a computer in noisy communication environment, and the considered signals are ASK-W, ASK-4, BPSK, QPSK, 8PSK, FSK, and QAM
A Study on the Performance Evaluation for the Integrated Voice/Data Transmission with FDDI
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 277~287
In this paper, we study the performance eualuations of the FDDI Network, by mathmeticlal analysis and simulation, in which the Integrated Voice/Data transmission system with voice traffic in synchronous mode and data traffic inasynchronous mode.For the mean waiting times of Voice/Data packet, we use two-state of Marcov models for voice traffic with talkspurt and silenci state, and the data traffic would traffic would transmit at the silence state of voice traffic. By the mean wating times, we analyze the relations between synchronous and asynchronous mode. As a result, using Sync/Async mode with voice and data, voice was not under influnece of data traffic. and in the same time,data can be tanaxmitted in a short waiting time, too
An Optimal 2D Quadrature Polar Separable Filter for Texture Analysis
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 288~296
This paper describes an improved 2D QPS(quadrature polar separable) filter design and its applications to texture processing. The filter kernel pair consists of the product of a radial weighting function based on the finite PSS (prolate spheroidal sequences) and an exponential at tenuation function for the orientational angle. It is quadrature and polar separable in the frequency domain. It is near optimal in the energy loss because we let the orientational angle function approximate the radial weighting function. The filter frequency characteristics is easy to control as it depends only upon the design specifications such as the bandwidth, the directional angle, the attenuation constant, and the shift constant of the central frequency. Some applications of the filter in texture processing, such as the generation of the texture image, the estimation of orientation angles, and the segmentations for the synthetic texture image, are considered. The result shows that the filter with the wide bandwidth can be used for the generation of discrimination of the strong orientational textures and the segmentation results are good.
Algorithms for Implementing One Chip Binary Image Processor
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 297~306
Algorithms for implementing one chip binary image processor has been studied. In this paper, image quality improvement algorithms, for the data pre-processed with shading and gamma correction after digitizing the analog signal from CCD or CIS, such as : Improved high quality binarization algorithm is suggested. Error diffusion algorithms for high quality half-tone images is analyzed, Fuzzy Theory based mixed mode algorithm is suggested.
A Study on the Design of the Bistatic Radar Integrated Data Network
The Journal of Korean Institute of Communications and Information Sciences, volume 17, issue 3, 1992, Pages 307~322
For designing the radar integrated data network, we construct the network structure with a spatial hieratchy decomposition scheme. The RIDN can be decomposed into several subent classes, those of which are composed of the several group classes of radar sites, In a group class. The communication nodes of a radar site are modeled by the software modules formulated with the statistical attributes of discrete events. And we get the analysis over the network through the separately constructed infra group level models which were coded with the C language.From the result of the simulation. We could findthe fact that the data integration system;s performance approaches to the theordtically calculated value after being stable. And also we could get the packet processing status of a communication module’s inner processor which is difficult to oberve through the mathematical calculation tin the subnet model of the integrated data network