Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Advanced Navigation Technology
Journal Basic Information
Journal DOI :
The Korea Navigation Institute
Editor in Chief :
Volume & Issues
Volume 12, Issue 6 - Dec 2008
Volume 12, Issue 5 - Oct 2008
Volume 12, Issue 4 - Aug 2008
Volume 12, Issue 3 - Jun 2008
Volume 12, Issue 2 - Apr 2008
Volume 12, Issue 1 - Feb 2008
Selecting the target year
Flight Measurement and Analysis of VOR Signal Influence from the Long Distance Surrounding Obstacles
Park, Hyeong-Taek ; Hwang, Byong-Won ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 1~7
International Civil Aviation Organization(ICAO) adopted VOR(Very high frequency Omni-Range) as an international standard air navigation system in 1949 and recommended every country to make use of it in formulating air route and guiding take-off and landing of an aircraft. VOR is quite a useful navigation system so that more than 2,000 VORs have been installed all over the world including 39 in Korea: however, VOR signal could be easily affected by its circumstance like a mountainous area because it provides navigation information through AM and FM of VHF carrier. Therefore this study intends to investigate how much VOR performance is affected by its circumstances. For this purpose, the performance of the 10 VORs influenced by 24 obstacles are measured and analyzed by using an aircraft equipped with measuring instruments. This study may give us a feasible solution of problems related to the VOR siting in the future.
Development of Filter for Localization of Moving Objects to Apply Ubiquitous Computing
Lee, Yang-Weon ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 8~14
In this paper, I have presented a new approach which can track moving objects in unknown environments. This scheme is important in providing a computationally feasible alternative to complete enumeration of JPDA which is intractable. I have proved that given an artificial measurement and track's configuration, proposed scheme converges to a proper plot in a finite number of iterations. In this light, even if the performance is enhanced by using the relaxation, I also note that the difficulty in tuning the parameters of the relaxation scheme is critical aspect of this suggestion.
Implementation of GPS Based Location Management System
Choi, Jae-Myeong ; Kang, Heau-Jo ; Lee, Sang-Heon ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 15~21
In this paper, person monitoring and personal identification information management by using the location positioning device and the location management system based on GPS is analysed and developed. Mobile HTE(Mobile HTE : Mobile Home Terminal Equipment) of the developed system uses the module for transmitting PID(Personal Identification Device) information and the module based on GPS's location information. HTE transmits the received information from Mobile HTE to the Location Management System through the internet system. The Location Management System is developed for person location management and information management.
Call Admission Control Using Adaptive-MMOSPRED for Resource Prediction in Wireless Networks
Lee, Jin-Yi ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 22~27
This paper presents adaptive-MMOSPRED method for prediction of resource demands requested by multimedia calls, and shows the performance of the call admission control based on proposed resource prediction method in multimedia wireless networks. The proposed method determines (I-CDP) random variables of the standard normal distribution by using LMS algorithm that minimize errors of prediction in resource demands, while parameters in an existing method are constant all through the prediction time. Our simulation results show that prediction error in adaptive-MMOSPRED method is much smaller than in fixed-MMOSPRED method. Also we can see via simulation the CAC performance based on the proposed method improves the new call blocking performance compared with the existing method under the desired handoff dropping probability.
A Study on Information Security policy for VoIP Service in Next Generation Networks
Sung, Kyung ; Kim, Seok-Hun ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 28~33
VoIP provided voice service using Internet is receiving footlights when it escapes an initial curiosity. VoIP interest became larger, because it can transfer existing phone service and deliver voice data through internet technology. Is inheriting as it is threats of IP base because a VoIP technology provides audiocommunication service taking advantage of an existing IP technology, and have new threats that happen from new know-hows for VoIP service offer. In this paper, presented about problem and consideration and countermeasure of examines about security threat of VoIP service, and applies security.
An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment
Lee, Deok-Gyu ; Kim, Tai-Hoon ; Yeo, Sang-Soo ; Kim, Seok-Soo ; Park, Gil-Cheol ; Cho, Seong-Eon ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 34~45
Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.
A Method for Extraction and Loading of Massive Traffic Data using Commercial Tools
Woo, Chan-Il ; Jeon, Se-Gil ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 46~53
The ITS(Intelligent Transport System) enables us to provide solutions on traffic problems, while maximizing safety and efficiency of road and transportation systems, by combining technologies from information and communication, electrical engineering, electronics, mechanics, control and instrumentation with transportation systems. The issues that an integration system for massive traffic data sources must face are due to several factors such as the variety and amount of data available, the representational heterogeneity of the data in the different sources, and the autonomy and differing capabilities of the sources. In this paper, we describe how to extract and load of the heterogeneous massive traffic data from the operational databases, such as FTMS and ARTIS using commercial tools. Also, we experiment on traffic data warehouses with integrated quality management techniques for providing high quality data.
Performance Analysis of STBC System Based on STTC in the Correlated Slow Fading Channel
Kang, Chul-Gyu ; Lee, Hyun-Jae ; Oh, Chang-Heon ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 54~60
The reliability of conventional wireless communication systems are diminished by multi-path fading, shadowing, propagation delay, pathloss, AWGN and an interference of the symbols. Therefore, we need more reliable system which can stably transmit multimedia datas over the poor communication environments, so, in this paper, we used STBC system based on STTC that allows a maximum space diversity gain of STBC scheme and channel efficiency, coding gain and diversity gain of STTC scheme at the same time. We did then analyzed the performance over the correlated slow fading channel between transmitter and receiver channels.
A Security Level Decision Method for Multimedia System
Kim, Tai-Hoon ; Lee, Deok-Gyu ; Yeo, Sang-Soo ; Cho, Sung-Eon ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 61~67
Each organization installing and operating multimedia system, to achieve the goal of organization, should decide security level, implement security countermeasure, and manage these countermeasures to keep the effects. To decide and manage security level of multimedia system, the first, organizations must be able to decide security level, and then, organizations must establish procedures for building security countermeasures according to security level. For the next step, organizations must be able to select areas where security countermeasures should be applied, and the last, organizations must be able to evaluate and improve the effect of security countermeasures. In this paper, based on the analysis of threat to multimedia system and the consideration for multimedia assets, we propose a method for deciding security level of multimedia system.
Design and Implementation of Real-Time Surveillance System using TCP/IP Socket
Lee, Jong-Sea ; Kim, Yu-Doo ; Moon, Il-Young ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 68~73
Recently, remote observation and control technology has grown gradually. According to use home network system and expand super-highway information network, digital video technology observation system gradually has increased. In order that the user conveniently use better than to use web browser observation system, it uses existing digital observation system, personal digital assistant and control module in the place of internet.
Adaptive Watermarking Algorithm Using Fuzzy Reasoning and Hybrid Scheme
Kim, Yoon-Ho ; Kim, Tae-Gon ;
The Journal of Advanced Navigation Technology, volume 12, issue 1, 2008, Pages 74~81
In this paper, adaptive watermarking algorithm which based on fuzzy reasoning and hybrid scheme is presented. To enforce the time and space complexity, hybrid scheme which utilize a color information as well as visual characteristics is also addressed. Proposed approach have double-aim: in first to use the visual characteristics so as to enforce the robustness of watermarking, and in second to select the optimal sub-band which is to be embedded a watermark. One of the principal advantage is that this approach involved the fuzzy inference module which is designed to select an optimal sub-band from the DWT coefficient blocks. In order to demonstrate the effectiveness of proposed algorithm, some numerical experiments of robustness and imperceptibility are evaluated with respect to such attacks as JPEG compression, noise and cropping.