Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 21, Issue 12 - Dec 1996
Volume 21, Issue 11 - Nov 1996
Volume 21, Issue 10 - Oct 1996
Volume 21, Issue 9 - Sep 1996
Volume 21, Issue 8 - Aug 1996
Volume 21, Issue 7 - Jul 1996
Volume 21, Issue 6 - Jun 1996
Volume 21, Issue 5 - May 1996
Volume 21, Issue 4 - Apr 1996
Volume 21, Issue 3 - Mar 1996
Volume 21, Issue 2 - Feb 1996
Volume 21, Issue 1 - Jan 1996
Selecting the target year
The implementation of the content-based image retrieval system using lines and bezier curves
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1861~1873
This paper describes the content-based image retrieval system that is implemented to retrieve images using constituent rate of lines and Bezier curves. We proposed the line and Bezier curve extraction algorithm which extracts lines and curve that are fitted on the contour information of images. For this extration, it was necessary to remove internal area of the proprocessed object within images and to approximate its contour to polygon, and proposed retrevial algorithm which gets the simularity using the consitituent rate of lines and curves and perform the simularity matching.
Face seqmentation using automatic searching algorithm of thresholding value and statistical projection analysis
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1874~1884
In this paper, we proposed automatic searching algorithm of thresholding value using multilevel thresholding for face segmentation from input bust image effectively. The proposed algorithm extracted the thresholding value of brightness that is formed background region, face region and hair region without illumination, background and face size from input image. The statistical projection analysis project the brightness of multilevel thresholding image into horizontal and vertical direction and decide the thresholding value of face. And the algorithm extracted elliptical type block of face from input image in order to reduce the back ground region and hair region efficiently. The proposed algorithm can reduce searching area of feature extraction and processing time for face recognication.
Realization of automatic video tracker using ASIC
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1885~1896
This paper describes the implementation of the AVT(Automatic video Tracker) using ASIC. The basic tracking algorithm is based on the spatio-temporal gradient method, and adaptive window sizing, track state decision algorithm were also realized. Newly developed ASIC performs recursive image filtering, extraction of spatio-temporal gradient/gradient functions of image in field rate. Using the FPGA/ASIC, the tracker was simply realized in one board type which can be easily applied to various image system. We conformed ASIC operation by computer simulation and tested the system in real tracking situations. From the result, the system can track the moving target which has a velocity of 2-3 pixel/field and a size of varying from 2 to 128 pixes. Also fast refresh rateof motion estimation(60Hz) improves the characteristics of servoing system which forms feedback loop with the tracker.
A study on the fingerpring enhancement using the fourier transform
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1897~1904
This study intends to extract the efficient spectrum characteristics of the fingerpriint image in the fourier domain and to apply them for image enhancement. In order to effectively acquire the spectrum characteristics of the fingerprint in the fourier domain, I set up a 1*64 window as a processing unit and, combining various kinds of the record and overlap lengths, made the power spectrum density estimate for each of those combinations. each spectrum characeristic acquired was applied to a re-synthesis process of the fingerprint image, and, through comparisons and evaluations of the resultant images, an improved gray scale image could be obtained. The validity of this algorithm could be confirmed by the comparison and evaluation fo the binary images which were grained on the established method and the one I used in this experiment.
Convergence analysis of data-recycling LMS equalizer
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1905~1913
The convergence characteristics of an LMS type Equalizer whose coefficient are multiple adapted in a symbol time period by recycling the received data are analyzed. The theoretical analysis shows that the data-recycling LMS technique can increase convergence speed by (B+1) times, where B is the number of recycled data. The results of the computer simulation demonstrate that the simulation results are in accordence with the theoretical analysis and the superiority of the equalizer algorithm.
Performance evaluation of multibuffered banyan networks
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1914~1927
Banyan networks have a number of applications in the area of computer and communications. While several analytical models have been proposed for the performance evaluation of Banyan networks, they are either not very accurate of too complex to be generalized. In this paper a new model for evaluating multibuffered MINs with 2*2 switching elements is proposed. the proposed model is very accurate for any size and traffic condition. It is also simple and can be easily generalized.
An adaptive bandwidth allocation for the two-layer VBR video transmission in ATM networks
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1928~1936
In this paper, we propose an adaptive bandwidth allocation algorithm for the transmission of VBR video through ATM Networks. In order to evaluate the required bandwidth for the VBR video, the characteristics of the compressed VBR video generated by the two-layered coder are analyzed with variations in the number of GOP(N), quantizer scale(q), and the number of low-frequency DCT coefficients(.betha.). The two-layer coder which is used to separate from the number of DCT coefficients is designed to transmit the VBR video efficiently. The compressed data generated by the two-layer coder are splitted into the high priority and low priority cells. If congestion is occurred in ATM networks, the minimum image quality is maintained by the high priority cells. The required bandwidth for VBR video is estimated with a prediction algorithm using the scene anframe correlations as well as the statistical properties of the VBR video sources. Strong correlation among the adjacent slices in a frame represents by the scene correlation andstrong correlation among the frames is represented by the frame correlation. The performance of the bandwidth allocation scheme proposed is evaluated in terms of the bandwith utilization, cell loss rate, and SNR with variations in q, n, .betha.. Simulation rewsults shown that the proposed scheme is superior to the conventional methods.
Object-oriented real-time system modeling considering predicatable timing constraints
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1937~1947
In the case of developing the real-time system using object-oriented method, k the problem of the timing constraints is certainly considered. we propose the method of modeling the object-oriented real-time system using the OMT methodology and the SDL. And we also present the predictable time table that reflects the constraints of real-time system into dynamic model of OMTs and the predicatable time formula of the sequence, repeat, and parallel routine. The proposed method is applied to the estimate of the maximum process time of the ATMs(Automatic teller machines) and is used to specifying the functional specification for the user interface of the ATMs using the SDL syntax and the object interaction graph.
Fault coverage evaluation method of test case for communcation protocol
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1948~1957
The conformance testing of communication protocol is the process to evaluate whether the protocol implemented is identified with standard specification. By evaluating how generated test cases detect many faults, it can be used with standard estimating efficiency of conformance testing. The method that evaluates the capability of fault coverage for test cases, has been researched by mathematical analysis and simulation. In this paper, we pointed out the problem of existing method and proposed new evaluation model of fault covergage for test case which generated by foult model. Also, we analyzed the results comparing to the existing evaluation method and proved its validity.
ATM call admission control based on a neural network for multiple service traffics
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1958~1969
This paper proposed a new approach to adaptive call admission control based on a neural network for multiple service classes with different quality of service (QoS) in the ATM-based Broadband Integrated Services Digital Networks. the proposed method extend Hiramatsu's neural network based "leaky pattern table" method for the single QoS[1, 2, 3] to deal with multiple services with different QoS by constructing multiple pattern tables based on each service's acceptance or rejection at the call set-up requests, and by simultaneously controlling each service's QoS according to the target QoS of the service and the trunk capacity. Computer simulation results on two service classes with different traffic characteristics and different cell loss rates as QoS, highlight good performance and effectiveness of the proposed call admission controller for multiple service classes.e classes.
A study on the traffic analysis in LAN environment
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1970~1975
The characteristics of data traffic on the Ethernet LAN are investigated on the basis of measurements. The analysis on the arrival pattern of packets on the network is found not to be a Poission process but to be Weibull distributions. An analysis of network traffic, packet arrivals are found to exhibit a 'source locality'. It is observed that file transfers are reponsible for about 92% of the traffic on the network. Our results will be useful for modelling purposes.
TCM schemes to improve the performance of 16 VSB CATV system
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1976~1988
This paper describes TCM(trellis coded modulation) schemes using 32VSB signal for digital CATV system. First we design optimum encoder with code rate 4/5 for 32VSB by using one dimenstional signal constellation and obtain 0.75-4.38 dB coding gains over the existing uncoded 16VSB. Second by using two dimensional signal constellation we design TCM encoders with code rate 9/10, which are better in the power efficienty (0.5-2.27 dB) and the transmission rate(12.5%), and we also design TCM encoders which have more coding gains than one dimensional TCM encoders for the larger number of states(more than 8 states).
An availability analysis of switching control system with warm standby fault tolerant architecture
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 1989~2002
In this paper, we describe several warm standby fault-tolerant models and their operation methods applicable to telephone switching control systems which have dual module structure and need high availability. Unavailabilities of the system implemented by four different methods for each model are computed by using the Markov state model, and then are compared for system performance evaluation. As the results ofsimulations, the warm standby model with triple processors is best in the aspect of data loss, while in most cases the warm standby model with doble processors based on no standby check method provides the highest system avaiability. Periodic changeover increases the system unavailability, but the preriodic standby check on standby module decreases the system unavailability of warm standby model with a single processor and with double processors. On the other hands, the variationas of warm standby model with a single processor and with double processors. On the other hand, the variations of data recovery time and personnel recovery rate have little effect on the system unavailtability.
16-state and 320state multidimensional PSK trellis coding scheme using M-ary orthogonal modulation with a frequency-recuse technique
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2003~2012
The 16- and 32-state Trellis-coded M-ary 4-dimensional (4-D) orthogonal modulation scheme with a frequency-reuse technique have been investigated. Here, 5 coded bits form a rate 4/5 convolutional encoder provide 32 possible symbols. Then the signals are mapped by a M-ary 4-D orthogonal modulator, where each signal has equal energy and is PSK modulated. In the M-ary 4-D modulator, we have employed the vectors which is derived by the optimization technique of signal waveforms in a 4-D sphere. This technique is usedin maximizing the minimum Euclidean distance between a set of signal poits on a multidimensional sphere. By combinig trellis coding with M-ary 4-D modulation and proper set-partitioning, we have obtained a considerable impeovement in the free minimum distance of the system over an AWGN channel. The 16-state scheme obtains coding gains up to 5.5 dB over the uncoded two-independent QPSK scheme and 2.5 dB over the two-independent 2-D TCM scheme. And, the 32-state scheme obtains coding gains up to 6.4 dB over the uncoded two-independent QPSK schemeand 3.4 dB over the two-independent 2-D TCM scheme.
An efficient method and performance analysis for burst synchronization/error detection using cyclic codes
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2013~2022
Cyclic Codes can be used for burs(or time slot) synchronization as well as error detection as that the overhead bits of the burst, which would be nessary to seperate burst synchronization and error detection systems, may be eliminated. In this paper a new method for combined burst synchronization and error detection is proposed which requires CRC decoding once only, while the previous method which inspects channel error after searching for burst synchronization requeires CRC decoding twice. The proposed method has the advantage of simple implementation and reducing processing time over the previous one, still showing the same detection perfdormance. It may occur that a burst different from the actually transmitted one is falsely accepted in the presence of channel errors. The exact expression for the false acceptance probability is newly presented through a simple derivation basied on the fact that it is determined by channel errors but not by detection methods.
Performance of hybrid spead spectrum systems in rayleigh fading channel
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2023~2032
In this paper, we calculate average bit error probabilities of asynchronous hybrid DS/FH-SSMA systems in AWGN chnnel and nonselective Rayleigh fading channel. We analyze and compare the performance of systems in AWGN channel and Rayleigh fading channel by using linear correlation receiver and hard limiting correlation receiver(nonlinear correlation receiver). Binary PSK scheme is considered and random spreading code sequences and random hopping patterns are used. Bit error probabilities of the systems with/without near-far problem under the same bandwidth expansion are calculated. the result shows that the performance of hard limiting correlation receiver is better than that of linear correlation receiver over nonselective Rayleigh fading channel.
Implementation of echo canceller for mobile communications interworking switch network
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2033~2042
In this papre, we describe a recently implemented echo canceller for digital cellular communication of Code Division Multiple Access(CDMA) that features time sharing of digital signal processor(DSP) over four channels in one DSP to reduce per channel costs. In the Public Land Mobile Network(PLMN), it is important to cancel the echo reflected from the Public Switched Telephone Network(PSTN) side. In case of digital mobile system, the round-trip delay of the echo is in excess of about 180 milliseconds due to frame-by-frame voice coding. It is necessary to cancel the echo in PLMN. We have developed a multi-channel echo canceller tht operates with Time Switch Module in a Mobile Switching Center(MSC). The general echo canceller needs PCM trunk interface circuits and the tone detection and disabling circuits, but the multi-channel echo canceller linked with Time Switch Module does not need them. Therefore we could develop the effective and economical echo canceller.
Design and implementation of digital delay locked loop
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2043~2054
In this paper, Digital Delay Locked Loop(DDLL) is designed, implemented and analysed by experiment whose results show that it is possible to track the received signal by this scheme. Designed digital DLL has an advantage that it is not needed to maintain gain balance between early and late channels, which has been problem with an analog DLL. Also DDLL has more improved noise performance compared to analog DLL due to noise level limitation and noise cancellation characteristics. For various loop parameters, their effects on loop performance are analysed and simulated. Proposed DDLL is the first attempt as a digital approach in code tracking loop and it is expected to be a good reference for spread spectrum communication research.
Compensation characteristics of channel imbalance in quadrature modulator and demodulator
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2055~2062
This paper presents a method of compensating for the gain and phase imbalance of quadrature modulator and demodulator. The gain and phase imbalance are compensated using the received power after the compensation pattern was transmitted at tranceiver. The proposed method is less vulnerable to changes in the transmission channel than the conventional method because compensation is made possible within the tranceiver system, and even the change in phase mblance in accordance with frequency can be compensated utilizing the adaptive algorithm. According to numerical results, a normalized eye opening and a bit error rate are improved by 1.8dB and 3.8dB, respectively.
An efficient punctured-coded TCM for the mobile satellite channel
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2063~2076
In this thesis, in order to apply a punctured convolutional codes to the trellis coded modulation(TCM), an efficient punctured trellis coded modulation(PTCM) based on the decomposition of the metric into orthogonal components is presented. Also, a simulation is performed in an additive white Gaussian noise(AWGN) and a rician fading channel modeling the mobile satellite channel. The PTCM combines punctured convolutional coding with MPSK modulation to provide a large coding gain in a power-limited or bandwidth-limited channel. However, in general the use of the punctured convolutional code structure in the decoder results in a performance loss in comparison to trellis codes, due to difficulties in assigning metrics. But, the study shows no loss in performance for punctured trellis coded MPSK in comparison to TCM, and what is more, the punctured convolutional codes results in some savings in the complexity of Viterbi decoders, compared to TCM of the same rate. Also, the results shows that the punctured trellis coded .pi./8 shift 8PSK is an attractive scheme for power-limited and band-limited systems and especially, the Viterbi decoder with first and Lth phase difference metrics improves BER performance by the mobile satellite channel.
A memory management scheme for parallel viterbi algorithm with multiple add-compare-select modules
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2077~2089
In this paper, a memory organization and its control method are proposed for the implementation of parallel Virterbi decoders. The design is mainly focused on lowering the hardware complexity of a parallel Viterbi decoder which is to reduce the decoding speed. The memories requeired in a Viterbi decoder are the SMM(State Metric Memory) and the TBM(Traceback Memory);the SMM for storing the path metrics of states and the TBM for storing the survial path information. A general parallel Viterbi decoder for high datarate usually consists of multiple ACS (Add-Compare-Select) units and their corresponding memeory modules.for parallel ACS units, SMMs and TBMs are partitioned into smaller independent pairs of memory modules which are separately interleaved to provide the maximum processing speed. In this design SMMs are controlled with addrss generators which can simultaneously compute addresses of the new path metrics. A bit shuffle technique is employed to provide a parallel access to the TBMs to store the survivor path informations from multiple ACS modules.
Ananlysis of decorrelating detector in the presence of the residual MAI
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2090~2098
This paper analyzes decorrelating detector for synchronous packet CDMA communications where a set of quasiorthogonal code waveforms are generated from a common code by assigning distinct initial code phases to all users. In this analysis, we characterize the residual multiple-access interference (MAI) caused by possibletiming offsets when synchronous and simultanceous packet transmissions are on the reverse link of centralize networks. Also, to show feasibility of decorrelating detector employing the common code, we further investigate its robustness against the multipath channel. It is demonstrated that the decorrelating detector greatly reduces the residual MAI to the order of N
, N number of chips/bit, and yields significant performance gain compared to the single user detector.
Design of monopulse feeder using corrugated E-plane horn
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2099~2108
The performance of the E-plane monopulse feeder is shown to e improved by using corrugated horn and multimode design. The proposed multimode corrugated horn is analyzed by the mode matching technique. an E-plane monopulse feeding horn is designed and fabricated to show the performance of the multimode corrugated horn. The experiment agrees quite well with the thoretical analysis. The results can be used in the design of monopulse type tracking radar antenna.
The performance of neural convolutional decoders on the satellite channels with nonlinear distortion
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2109~2118
The neural convolutional decoder(NCD) was proposed as a method of decoding convolutional codes. In this paper, simulation results are presented for coherent BPSK in memoryless AWGN channels and coherent QPSK in the satellite channels. The NCD can learn the nonlinear distortion caused by the charactersitics of the satellite channel including the filtering effects and the nonlinear effects of the travling wave tube amplifier(TWTA). Thus, as compared with the AWGN channel, the performance difference in the satellite channel between the NCD for the systematic code and the Viterbi decoder for the nonsystematic code is reduced.
Nonlinear mappings of interval vectors by neural networks
The Journal of Korean Institute of Communications and Information Sciences, volume 21, issue 8, 1996, Pages 2119~2132
This paper proposes four approaches for approximately realizing nonlinear mappling of interval vectors by neural networks. In the proposed approaches, training data for the learning of neural networks are the paris of interval input vectors and interval target output vectors. The first approach is a direct application of the standard BP (Back-Propagation) algorithm with a pre-processed training data. The second approach is an application of the two BP algorithms. The third approach is an extension of the BP algorithm to the case of interval input-output data. The last approach is an extension of the third approach to neural network with interval weights and interval biases. These approaches are compared with one another by computer simulations.