Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Kyung-Hi Chang / Song Chong / Jong-Taek Oh / Jae-Jin Lee / Myung-Sik Yoo
Volume & Issues
Volume 24, Issue 12B - Dec 1999
Volume 24, Issue 12A - Dec 1999
Volume 24, Issue 11A - Nov 1999
Volume 24, Issue 10B - Oct 1999
Volume 24, Issue 10A - Oct 1999
Volume 24, Issue 9B - Sep 1999
Volume 24, Issue 9A - Sep 1999
Volume 24, Issue 8B - Aug 1999
Volume 24, Issue 8A - Aug 1999
Volume 24, Issue 7B - Jul 1999
Volume 24, Issue 7A - Jul 1999
Volume 24, Issue 6B - Jun 1999
Volume 24, Issue 6A - Jun 1999
Volume 24, Issue 5B - 00 1999
Volume 24, Issue 5A - 00 1999
Volume 24, Issue 4B - 00 1999
Volume 24, Issue 4A - 00 1999
Volume 24, Issue 3B - 00 1999
Volume 24, Issue 3A - 00 1999
Volume 24, Issue 2B - 00 1999
Volume 24, Issue 2A - 00 1999
Volume 24, Issue 1B - 00 1999
Volume 24, Issue 1A - 00 1999
Volume 24, Issue 12 - 00 1999
Volume 24, Issue 11B - 00 1999
Selecting the target year
Design of the Template System for Cyber Education
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2225~2232
We designed the template system for cyber education, which is a software infrastructure for knowledge information society. First, we defined the common functions of our system based on the design principles of cyber education and working results of international standardization group. Second, we think that template system will make a big role in order to deploy the cyber education system. Therefore, we designed the template system for cyber education. Our designed template system is able to implement cyber education system easily such as normal education, technical education, re-education, private education etc. Therefore, This paper describes the practical use environment, configuration of system components, design technique, expected effects on our cyber education template system.
A Design Methodology of TMN Distributed Object based on Platform Independent Class Repository
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2233~2248
The TMN that appears to operate the various communication networks generally and efficiently is developed under the different platform environment such as the different hardware and the different operating system. One of the main problems is that all the agents of the TMN system must be duplicated and maintain the software and the data blocks that perform the identical function. Therefore, the standard of the Q3 interface development cannot be defined and the multi-platform cannot be supported in the development of the TMN agent. In order to overcome these problems, the Farming methodology that is based on the Farmer model has been suggested. With the Farming methodology, the software and the data components which are duplicated and stored in each distributed object are saved in the platform independent class repository(PICR) by converting into the format of the independent componentware in the platform, so that the componentwares that are essential for the execution can be loaded and used statically or dynamically from PICR as described in the framework of each distributed object. The distributed TMN agent of the personal communication network is designed and developed by using the Farmer model.
Implementation of the Label Distribution Protocol for the Multiprotocol Label Switching
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2249~2261
In this paper, we describe the design and implementation of the Label Distribution Protocol (LDP) for Multiprotocol Label Switching System. We review the implementation issues of LDP that is required to make a gigabit switched router, and propose a detail design of it. We present the data structures and procedures for the LDP as a result, which are based on IETF standard. We present design issues for applying this to carrier class products. The implemented protocol could afford 40,000 entries of the IP routing table that is required for deploying this system to commercialized data network. Furthermore this system implemented using the standard API of Unix, as a result, it has portability. By implementing LDP based on the international standard and these implementation issues, we expect that the implemented LDP will be interoperable with other commercialized products. We prove the validity of the design of the LDP through prototyping, and also verify the prototype with the specification using the process algebra and the performance analysis.
An Integrated management Platform for Multicast Environments of the multipeer, multimedia applications
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2262~2274
This paper, proposes an integrated management platform to solve various management issues for multicast environments, which have been considered as an important transfer method together the appearance of multipeer applications recently(i.e,. IPME). First of all this paper describes the problems and related works of multicast environments, and proposes the general architecture of a management platform to manage multicast environments after considering design requirements to implement a proposed platform. This paper also proposes the management services to be provided, a general system architecture, its functional modules, and the management architecture such as a management procedure, establishment phases, management policies, and a Management Information Base(MIB) structure. In order to verify the proposed IPME, it is also applied and implemented as prototyping system to the QoS management service for H.263 video encoding/decoding system, that is IPME-QoS, which currently is a critical issue and uses multicast environments.
A Study on the ABR Traffic Control Mechanism using Dynamic Bandwidth Allocation
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2275~2282
In ATM networks, bandwidth allocation using available bandwidth is important to control ABR traffic efficiently. However, it is difficult to dynamically assign bandwidth on bursty traffic, because the tracking of the existing available bandwidth information uses statistical value. In this paper, we propose a output-bufferd ATM switch using Per-VC queueing scheme with timer and Controller. The controller determines whether each VC is in congestion state or not, and the timer can assign dynamically as determining the available bandwidth for the Present period by Backlogged time and total link capacity, and then transmitting the determined bandwidth to source. Instead of using statistical parameters, the proposed scheme can improve link efficiency as allocating the bandwidth of the next period, by use of measured bandwidth during the current period.
New Design Approach for Improving the Performance of Collaborative Applications using Active Networks
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2283~2291
Most of collaborative applications use the Server-Client paradigm where all requests of clients will be delivered first to server and that server distributes again the requests to the rest of clients. This server-oriented operation and data transmission mechanism always presents end-to-end communications between the server and clients that can notably decrease the overall performance of applications. In this paper, we propose a new design approach to inhibit the inefficiency of applications using active networking concepts. We propose the ASM service that offers an application-specific in-network multicast functions, the AMTC service and its tree algorithm that builds anon-core based shared tree for multicast. These proposed services locate in active nodes performing its services as part of the overall system to improve the performance of collaborative applications.
A Study on Poly-pulse Pair Estimation Method for Reduction of Bias Errors in a Weather Radar
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2292~2297
Some observed weather spectra show that nearly 25% of weather spectra are seriously skewed and can not be considered to be symmetric. However, the conventional pulse pair method was derived and has been evaluated under the assumption that the weather spectrum is symmetric and narrow. This means that the conventional pulse pair method may need reevaluation. Therefore, this paper analyzed the bias errors of pulse pair estimates in the skewed spectra. The bias errors of pulse pair mean estimates are more serious comparing with the pulse pair width estimates. In this paper, the poly-pulse pair method is suggested to reduce these bias errors of mean estimates. It was shown that the mean bias errors can be reduced remarkably using the newly suggested poly-pulse pair method.
A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System (PARTI: MMBS general issues, clystering and signalling Procedures)
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2298~2319
In this paper, we propose a new moving mobile base station (MMBS) scheme for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. RMIMS terminals can be used in various application service areas such as pollution monitoring, environment surveillance, traffic monitoring, emergency monitoring (e.g., building, bridge, railroad breakdown), security monitoring (e.g., theft, alarm) and military application. For these applications based on wireless transmission technologies, sensor type RMIMS terminals must satisfy low cost and low power design (e.g., solar power, life limited battery) requirement. In RMIMS terminal design, this low power requirement limits transmission range of uplink or reverse link and means small cell size. Also these applications using RMIMS terminals may have a little bit non real-time traffic characteristic and low scattering density in service area.
A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System(PartII:Multiple MMBS service schemes for RMIS QoS guarantee)
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2320~2334
In this paper, we propose multiple IS-MMBS service schemes for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. In MMBS service area, when new arrival RMIMS terminals have real-time traffic characteristic or large traffic bandwidth, only single IS-MMBS service scheme can not guarantee RMIMS terminal's QoS(quality of service) such as buffer overflow or packet loss. In this case, the proposed multiple IS-MMBS service schemes can be effectively used for QoS service of RMIMS terminal. According to clustering method of RMIMS terminals and MMBS segment method, the proposed schemes can be divided into terminal segment method, region segment method, application based segment method, traffic type based segment method, overlapping segment method and hybrid segment method
A Study on the Design and Fabrication of the Planar Light Waveguide type
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2335~2341
coupler consists of Mach-Zehnder interferometer and Y branch coupler. For the designs of this coupler, three dimensional rectangular core waveguide decomposed to two-dimensional structure by the effective index method. To optimize the waveguide structure, the confinement factor was investigated with two-dimensional finite difference Beam Propagation Method. The
coupler fabricated by simulation with height between Mach-Zehnder arms, H=
) was showed best characteristics. In the results of dry etching of core layer, the etching rate of core layer was above 2600
/min, the etching ratio of SiO2 to Al mask was 30:1 and the uniformity of etching was
5%. The maximum insertion loss and the uniformity of
coupler were below 19.2dB, 2dB respectively.
Vector Quantization Codebook Design Using Unbalanced Binary Tree and DCT Coefficients
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2342~2348
DCT-based codebook design using binary tree was proposed to reduce computation time and to solve the initial codebook problem. In this method, DCT coefficient of training vectors that has maximum variance is to be a split key and the mean of coefficients at the location is used as split threshold, then balanced binary tree for final codebook is formed. However edge degradation appears in the reconstructed image, since the blocks of shade region are frequently selected for codevector. In this paper, we propose DCT-based vector quantization codebook design using unbalanced binary tree. Above all, the node that has the largest split key is splited. So the number of edge codevector can be increased. From the simulation results, this method reconstructs the edge region sincerely and shows higher PSNR than previous methods.
Object-based Stereoscopic Video Coding Using Image Segmentation and Prediction
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2349~2358
Object-based stereoscopic video coding scheme is presented in this paper. In conventional BMA based stereoscopic video coding for low bit rate transmission, image prediction errors such as block artifacts and mosquito phenomena are occurred. In order to reduce these errors, object based coding scheme is adopted. The proposed scheme consists of preprocessing, object extraction, and object update procedures. The preprocessing procedure extracts non-object regions having low reliability for motion and disparity estimation. This procedure prohibits extracting inaccurate objects. For the better prediction of left channel image, the disparity information is added to the object extraction. And the proposed algorithm can reduce the accumulated error through the object update procedure that detects newly emerging objects, merges objects that have the same object-disparity and object motion, and splits object which has large image prediction error. The experimental results show that the proposed algorithms improve the quality of the prediction without block artifacts and mosquito phenomena.
A 2D FLIR Image-based 3D Target Recognition using Degree of Reliability of Contour
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2359~2368
In this paper we propose a 2D FLIR image-based 3D target recognition system which performs group-to-ground vehicle recognition using the target contour and its degree of reliability extracted from FLIR image. First we extract target from background in FLIR image. Then we define contour points of the extracted target which have high edge gradient magnitude and brightness value as reliable contour point and make reliable contour by grouping all reliable contour points. After that we extract corresponding reliable contours from model contour image and perform comparison between scene and model features which are calculated by DST(discrete sine transform) of reliable contours. Experiment shows that the proposed algorithm work well and even in case of imperfect target extraction it showed better performance then conventional 2D contour-based matching algorithms.
Iterative Reduction of Blocking Artifact in Block Transform-Coded Images Using Wavelet Transform
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2369~2381
In this paper, we propose an iterative algorithm for reducing the blocking artifact in block transform-coded images by using a wavelet transform. In the proposed method, an image is considered as a set of one-dimensional horizontal and vertical signals and one-dimensional wavelet transform is utilized in which the mother wavelet is the first order derivative of a Gaussian like function. The blocking artifact is reduced by removing the blocking component, that causes the variance at the block boundary position in the first scale wavelet domain to be abnormally higher than those at the other positions, using a minimum mean square error (MMSE) filter in the wavelet domain. This filter minimizes the MSE between the ideal blocking component-free signal and the restored signal in the neighborhood of block boundaries in the wavelet domain. It also uses local variance in the wavelet domain for pixel adaptive processing. The filtering and the projection onto a convex set of quantization constraint are iteratively performed in alternating fashion. Experimental results show that the proposed method yields not only a PSNR improvement of about 0.56-1.07 dB, but also subjective quality nearly free of the blocking artifact and edge blur.
High Bit Rate Image Coder Using DPCM based on Sample-Adaptive Product Quantizer
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2382~2390
In this paper, we employed a new quantization scheme called sample-adaptive product quantizer (SAPQ) to quantize image data based on the differential pulse code modulation (DPCM) coder, which has fixed length outputs and high bit rates. In order to improve the performance of traditional DPCM coders, the scalar quantizer should be replaced by the vector quantizer (VQ). As the bit rate increases, it will be nearly impossible to implement a conventional VQ or modified VQ, such as the tree-structured VQ, even if the modified VQ can significantly reduce the encoding complexity. SAPQ has a form of the feed-forward adaptive scalar quantizer having a short adaptation period. However, since SAPQ is a structurally constrained VQ, SAPQ can achieve VQ-level performance with a low encoding complexity. Since SAPQ has a scalar quantizer structure, by using the traditional scalar value predictors, we can easily apply SAPQ to DPCM coders. For synthetic data and real images, by employing SAPQ as the quantizer part of DPCM coders, we obtained a 2~3 dB improvement over the DPCM coders, which are based on the Lloyd-Max scalar quantizers, for data rates above 4 b/point.
Sample-Adaptive Product Quantization and Design Algorithm
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2391~2400
Vector quantizer (VQ) is an efficient data compression technique for low bit rate applications. However, the major disadvantage of VQ is its encoding complexity which increases dramatically as the vector dimension and bit rate increase. Even though one can use a modified VQ to reduce the encoding complexity, it is nearly impossible to implement such a VQ at a high bit rate or for a large vector dimension because of the enormously large memory requirement for the codebook and the very large training sequence (TS) size. To overcome this difficulty, in this paper we propose a novel structurally constrained VQ for the high bit rate and the large vector dimension cases in order to obtain VQ-level performance. Furthermore, this VQ can be extended to the low bit rate applications. The proposed quantization scheme has a form of feed-forward adaptive quantizer with a short adaptation period. Hence, we call this quantization scheme sample-adaptive product quantizer (SAPQ). SAPQ can provide a 2 ~3dB improvement over the Lloyd-Max scalar quantizers.
A Cut Detection Algorithm by Using Spatial Vectors of DC Components on MPEG Video Sequence
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2401~2406
Various techniques extracting feature vectors have been studied for the cut detection in compressed video data. In case of using the histogram of occurrence of pixel's values as a feature vector, the precise detection of cuts would not be expected because of not considering the spatial correlation of pixels. And more sophisticated algorithms such as CCV(Color Coherent Vector) and Correlrogram tend to be used. Though these methods can be able to detect cuts rather precisely, they require much more processing time because of a enormous amount of computations. In this paper we propose a method of the cut detection using spatial correlation of DC values of luminance components in MPEG video sequence. This requires less processing time and also It can increase the rates of detecting the correct cuts by using advanced comparative method.
An Image Compression Algorithm Using the WDCT (Warped Discrete Cosine Transform)
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2407~2414
This paper introduces the concept of warped discrete cosine transform (WDCT) and an image compression algorithm based on the WDCT. The proposed WDCT is a cascade connection of a conventional DCT and all-pass filters whose parameters can be adjusted to provide frequency warping. In the proposed image compression scheme, the frequency response of the all-pass filter is controlled by a set of parameters with each parameter for a specified frequency range. For each image block, the best parameter is chosen from the set and is sent to the decoder as a side information along with the result of corresponding WDCT computation. For actual implementation, the combination of the all-pass IIR filters and the DCT can be viewed as a cascade of a warping matrix and the DCT matrix, or as a filter bank which is obtained by warping the frequency response of the DCT filter bank. Hence, the WDCT can be implemented by a single matrix computation like the DCT. The WDCT based compression, outperforms the DCT based compression, for high bit rate applications and for images with high frequency components
Secure Fingerprint Identification System based on Optical Encryption
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2415~2423
We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.
A design of convolutional encoder and interleaver with minimized memory size
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2424~2429
In this paper, we present a memory efficient implementation method of channel encoder using convolutional encoding and interleaving. In conventional method, two separate RAMs must be used for the channel encoder: one RAM for storing frame data and another RAM for interleaving. In our method, without using interleaving RAM, we only use two small RAMs for buffering input frame data. We can process convolutional encoding and interleaving concurrently by using the two RAMs. There are several advantages when applying channel encoder designed using this method to several digital mobile telecommunications : the reduction of memory size ranging 33 % - 60 %, simplified procedure of receiving frame data, and resultant timing margin gained by the simplified procedure.
Adaptive time-based location update using fuzzy logic
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2430~2437
This paper introduces an adaptive time-based location update scheme that dynamically determines when to perform location update based on moving distance of mobile station and incoming call arrival probability using fuzzy logic. Comparison with other schemes demonstrate that proposed scheme adapts well to the environment where the characteristics of mobility pattern of mobile station is changed all the time, and reveals better performance in the aspect of network signaling load.
A Study on the determination of proper block and searching area size by using the total disparity of stereo pairs
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2438~2446
Most of block based stereo pair compression schemes utilize the constant block size and searching area size for all the stereo pairs to find the best matching block. However, it is not efficient to use the same block size and size of searching area to all the stereo pairs, since each stereo pair has different disparity. In this Paper, we propose a method to calculate the total disparity of stereo pairs, and show how to determine the size of the block and searching area which are applied for the block based compression of the stereo pairs.
Recognition of Korean Isolated Digits Using Classification and Prediction Neural Networks
The Journal of Korean Institute of Communications and Information Sciences, volume 24, issue 12B, 1999, Pages 2447~2454
This paper proposes a N-APPEM(Nonlinear A Posteriori Probability Estimation Method) with a frame normalization method to conventional classification network to increase speech recognition ability. It also tests the recognition ability of the classification and prediction neural networks for the Korean isolated digits. From the experimental results, the prediction network with MLP(Multi-Layer Perceptron) achieves the highest recognition ability of 98.0%. The prediction requires very complicated networks increased linearly with the number of incoming speech categories. However, the classification network with the N-APPEM and the normalization improves the recognition ability up to 85.5% with a sin81e network, which is almost 12.0% improvement.