Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Advanced Navigation Technology
Journal Basic Information
Journal DOI :
The Korea Navigation Institute
Editor in Chief :
Volume & Issues
Volume 14, Issue 6 - Dec 2010
Volume 14, Issue 5 - Oct 2010
Volume 14, Issue 4 - Aug 2010
Volume 14, Issue 3 - Jun 2010
Volume 14, Issue 2 - Apr 2010
Volume 14, Issue 1 - Feb 2010
Selecting the target year
A Design of Ontology-driven Historical Information Services
Nah, Bang-Hyun ; Kwon, Chang-Hee ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 143~150
Ontologies, which are consist of entities and their relationships, have been used to implement various scenarios of information services. That is because an entity can be understood well when the surrounding entities and the relationships are known. In describing historical events. The spatio-temporal locations connote the historical context comprehensively. Therefore spatio-temporal locations are one of the most important carriers to connect the historical events. In this paper we analyzed the usage scenarios to access and retrieve historical information, and proposed the design of ontologies for historical information services for making historical stories based on spatio-temporal reference frame.
Design and Evaluation of a GNSS Receiver Network For Lane-By-Lane Traffic Monitoring
Kim, Hee-Sung ; Lee, Hyung-Keun ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 151~160
For the realization of future intelligent transportation systems, fine-grained lane-by-lane traffic monitoring and control functionalities are among the most important technology barriers to overcome. To satisfy the accuracy requirement for traffic monitoring, a GNSS receiver network is designed. The designed receiver network consists of three different types of entities; reference server, broadcaster, and client. For deployment flexibility, all the entities utilize the international message standard RTCM SC-104 version 3.0. For fine-grained traffic monitoring, the client is designed to utilize position-domain carrier-smoothed-code filters to provide accurate vehicle coordinates in spite of frequent addages and outages of visible satellites. An experiment result is presented to evaluate the positioning accuracy of the proposed method.
A Study On Route Calculation Algorithm For Effective Air Traffic Flow Management
Kim, Yong-Kyun ; Jo, Yun-Hyun ; Yun, Jin-Won ; Park, Dong-Hwa ; Choi, Sang-Bang ; Park, Hyo-Dal ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 161~169
According to the recent increase in air traffic more efficient air traffic control is required. This paper proposes the algorithm for efficient air traffic flow management. Aeronautical traffic environment is different from the common traffic environment since it needs vertical and horizontal separation deviation. In this paper used vincenty's fomula, we calculated distance of route for produced weight that was applied air traffic volume in distance of route using dijkstra algorithm. Then we let aircraft selects a course that minimize to wasting of fuel and time. As a simulation result, so unlilke simply shortest course calculation of existing course calculation algorithm, we confirmed that proposed algorithm in this paper can do air traffic control more efficiently by selecting optimized route.
A Study on the Design of Polarization Selective Antenna for UHF RFID System
Lee, Sa-Won ; Song, Woo-Yong ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 170~175
This article proposed polarization selective antenna for UHF RFID system. The proposed antenna is consist of microstrip patch antenna with dual feeding and two SPDT switches and a SP4T switch and 3dB hybrid coupler. Through control of voltage of switches, the proposed reader antenna can select horizontally linear polarization, vertically linear polarization, left-hand circular polarization (LHCP) and right hand circular polarization (RHCP). The proposed reader antenna satisfied 2:1 VSWR at 902MHz ~ 928MHz. and 3dB under AR(axial ratio). And it can select appropriative polarization with user environment and tag polarization. So it minimize PLF and increased reading distance.
High Efficiency Frequency Tunable Inverse Class-E Amplifier
Kim, Young ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 176~182
This paper proposes that an inverse class-E amplifier is used a tunable parallel resonator at output port in order to maintain a high power-added efficiency(PAE) and output power with wide frequency ranges. A tunable circuit has a constant Q factor at operating frequency ranges and because of using varactor diode, the inductor and capacitor values of resonator can be changed. Also, the inductance value for zero-current switching (ZCS) is implemented a lumped element and the capacitance value is made a distributed element for phase compensation. The inverse class E amplifier using tunable parallel resonator is obtained to deliver 25dBm output power and achieve maximum power added efficiency(PAE) of 75% at 65-120MHz frequency ranges.
A Fake Content Remove Scheme using Binomial Distribution Characteristics of Collective Intelligence in P2P
Cha, Byung-Rae ; Kim, Jong-Won ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 183~190
A P2P network can be created or destroyed automatically because it is based on the structural characteristic of being promoted by peer communities' free participation. While users can share resources they want in a P2P, there are also many resources they do not want such as fake contents. As one method of removing fake contents, it is suggested to use collective intelligence in P2P environment. And we simulated merit of reputation system.
LAB color illumination revisions for the improvement of non-proper image
Na, Jong-Won ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 191~197
Many does an application and application but the image analysis of face detection considerably is difficult. In order for with effect of the illumination which is irregular in the present paper America the illumination to range evenly in the face which is detected, detects a face territory, Complemented the result which detects only the front face of existing. With LAB color illumination revisions compared in Adaboost face detection of existing and 32% was visible the face detection result which improves. Bought two images which are input and executed Glassfire label rings. Compared Area critical price and became the area of above critical value and revised from RGB smooth anger and LAB images with LCFD system algorithm. The operational conversion image which is extracted like this executed a face territory detection in the object. In order to extract the feature which is necessary to a face detection used AdaBoost algorithms. The face territory remote login with the face territory which tilts in the present paper, until Multi-view face territory detections was possible. Also relationship without high detection rate seems in direction of illumination, With only the public PC application is possible was given proof user authentication field etc.
A Study on the Interface Selection Scheme of Mobile Nodes with Multiple Interfaces in Ubiquitous Environments
Kim, Seong-Chul ; Moon, Il-Young ; Cho, Sung-Joon ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 198~205
Any user in Ubiquitous environments have to be able to access networks in anywhere and anytime. Thus interests and researches are increasing. In this paper, we propose an interface selection scheme that adaptively utilizes a proper interface, as the wireless channel condition changes, instead of utilizing only one interface while the node is in move. The proposed scheme can determine which interface would be the most proper one by measuring data rate, packet error rate (PER), and end-to-end delay of each interface. From the simulation results, it is verified that the proposed scheme is able to enhance packet transmission about 20% better.
Robotic Zigbee Network for Control of Ubiquitous Robot
Moon, Yong-Seomn ; Roh, Sang-Hyun ; Lee, Kwang-Seok ; Park, Jong-Kyu ; Bae, Young-Chul ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 206~212
In this paper, we introduce the concept of robotic zigbee network as a necessary network to provide an application service of robot in the ubiquitous environment and propose an application scenario using the concept of robot Zigbee network. We have performed experiments on the network connection and data transmission which are basic of proposed an application scenario. Through the result of the experiments, we provide basis for development of robot localization and tracking algorithm which minimizes the localization error using robot Zigbee network in the future.
Modem Structure and PAPR Reduction Method for 4G Mobile Communication Service
Kim, Wan-Tae ; Cho, Sung-Joon ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 213~219
Recently, a multi-core system is studied for single terminal's operations on various service networks for mobile systems. Therefore, it is expected that mobile systems capable of supporting WCDMA, MC-CDMA, CDMA and WiBro would be developed. Mobile systems for supporting various service networks is able to be implemented on a single chipset via SoC(System one Chip) technology, thus a noble modem design proper for SoC technology is necessary. For high speed data transmission of 4G mobile communication services, OFDM scheme has to be applied. But, an OFDM signal consists of a number of independently modulated subcarriers, and superposition of these subcarriers cause a problem that can give a large PAPR. In this paper, a noble modem design for 4G mobile communication services and PAPR reduction method for solving the PAPR problem are proposed.
Low Power Symbol Detector for MIMO Communication Systems
Hwang, You-Sun ; Jang, Soo-Hyun ; Jung, Yun-Ho ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 220~226
In this paper, an low power symbol detector is proposed for MIMO communication system with two transmit and two receive antennas. The proposed symbol detector can support both the spatial multiplexing (SM) mode and spatial diversity (SD) mode for MIMO transmission technique, and shows the optimal maximum likelihood (ML) performance. Also, by sharing the hardware block and using the dedicated clock MIMO modes, the power of the proposed architecture is dramatically decreased. The proposed symbol detector was designed in hardware description language (HDL) and synthesized to logic gates using a
CMOS standard cell library. The power consumption was estimated by using Synopsys Power CompilerTM, which is reduced by maximum 85%, compared with the conventional architecture.
Design and Implementation of Sensor Node Hardware Platform Based on Sensor Network Environment
Kwak, Yoon-Sik ; Choi, Jong-Nam ; Mun, Cheol ; Jung, Chang-Kyoo ; Park, Dong-Hee ; Song, Seok-Il ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 227~232
According to the development of ubiquitous and computer techniques, the application fields of sensor network have been enlarged. We present the design and implementation of sensor node which is the most important component of sensor network techniques in this paper. The proposed sensor node is implemented with 8-bit microprocessor, and temperature and humidity sensing device to gather temperature and humidity data in real world. It achieves low production cost and user convenience, and also has the feature os existing commercial sensor node. Though our experiments, we show that deviation of temperature and humidity are
and 23.2% respectively, and the proposed sensor node is reliable in real applications.
Fault Tolerant Processor Design for Aviation Embedded System and Verification through Fault Injection
Lee, Dong-Woo ; Ko, Wan-Jin ; Na, Jong-Wha ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 233~238
In this paper, we applied the forward and backward error recovery techniques to a reduced instruction set computer (risc) processor to develop two fault-tolerant processors, namely, fetch redundant risc (FRR) processor and a redundancy execute risc (RER) processor. To evaluate the fault-tolerance capability of three target processors, we developed the base risc processor, FRR processor, and RER processor in SystemC hardware description language. We performed fault injection experiment using the three SystemC processor models and the SystemC-based simulation fault injection technique. From the experiments, for the 1-bit transient fault, the failure rate of the FRR, RER, and base risc processor were 1%, 2.8%, and 8.9%, respectively. For the 1-bit permanent fault, the failure rate of the FRR, RER, and base risc processor were 4.3%, 6.5%, and 41%, respectively. As a result, for 1-bit fault, we found that the FRR processor is more reliable among three processors.
Document Clustering using Non-negative Matrix Factorization and Fuzzy Relationship
Park, Sun ; Kim, Kyung-Jun ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 239~246
This paper proposes a new document clustering method using NMF and fuzzy relationship. The proposed method can improve the quality of document clustering because the clustered documents by using fuzzy relation values between semantic features and terms to distinguish well dissimilar documents in clusters, the selected cluster label terms by using semantic features with NMF, which is used in document clustering, can represent an inherent structure of document set better. The experimental results demonstrate that the proposed method achieves better performance than other document clustering methods.
A Study on Certification System for Assurance of Secure Information Security Product Development
Kang, Soo-Young ; Park, Jong-Hyuk ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 247~252
According to IT technology has evolved, a lot of information are moving through network. The correct internet users can obtain useful information. But incorrect users expose information and cause various damage for malicious purpose. To solve this problem, various information security products are being developed. For development of secure information security product, the development process should be secure. Also evaluation system is being used about product evaluation and security module for the assurance of secure product. In this paper, we proposed assurance system for secure development of information security product. Therefore this paper proposed more secure product development and assurance scheme.
Performance Improvement of Wireless Mesh Networks using TCP Congestion Control Algorithm
Lee, Hye-Rim ; Moon, Il-Young ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 253~259
Wireless mesh network is flexible network like Ad hoc network or bluetooth together based on base station. But, wireless mesh network shows high packet loss and when TCP was created, however as it was design based on wired link, wireless link made more transmission error than wired link. It is existent problem of TCP congestion control algorithm that TCP unfairness and congestion collapse over wireless mesh network. When TCP operation occurs with the packet loss where is not the congestion loss, it brings the performance degradation which is serious. In this paper, in order to improve efficient TCP congestion control algorithm in wireless mesh network, we proposed that TCP can adaptively regulate the congestion window in wireless link.
A Study on the Establishment of the Disaster Safety Management System
Kang, Heau-Jo ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 260~265
In this paper, we study of the disaster safety management system and find recognition comprehensions and the problem points which are basic in our system. We dedicate this research on improvement analysis and main discussion issues of the system that based on diagnostics in developed countries' system. By taking some essential points of advanced like systems, we construct our own system. Beside that it is proposed to solve problems and find improvement issues by comparing with advanced systems.
A Study on Development of the Evaluation Guideline for the Storage Performance
Ko, Dae-Sik ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 266~271
In this paper, we chose IOPS(input output operation per second) and MB/s as a performance standard, and we developed the evaluation standard for the storage performance. Since there is no vendor-neutral evaluation criteria for storage performance, it is difficult to evaluate storage performance and design the storage resource's sizing. We proposed block size for measurement of the storage's IOPS for OLTP(online transaction processing) application to 4KB, 8KB and 16KB and read/write rate of it to 7:3. On the other hand, we proposed block size for measurement of the storage's IOPS for backup, VOD, Large file processing) to 64KB, 256KB and 1024KB and read/write rates of it to 7:3 and 1:0. Finally, we proposed the Vdvench BMT tool, which is independent on platform. We also developed the result reporting tool for developed evaluation criteria.
Realtime Markerless 3D Object Tracking for Augmented Reality
Min, Jae-Hong ; Islam, Mohammad Khairul ; Paul, Anjan Kumar ; Baek, Joong-Hwan ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 272~277
AR(Augmented Reality) needs medium between real and virtual, world, and recognition techniques are necessary to track an object continuously. Optical tracking using marker is mainly used, but it takes time and is inconvenient to attach marker onto the target objects. Therefore, many researchers try to develop markerless tracking techniques nowaday. In this paper, we extract features and 3D position from 3D objects and suggest realtime tracking based on these features and positions, which do not use just coplanar features and 2D position. We extract features using SURF, get rotation matrix and translation vector of 3D object using POSIT with these features and track the object in real time. If the extracted features are nor enough and it fail to track the object, then new features are extracted and re-matched to recover the tracking. Also, we get rotation in matrix and translation vector of 3D object using POSIT and track the object in real time.
User Model Expansion for Adaptive Learning in Ubiquitous Environment
Jeong, Hwa-Young ; Kim, Yoon-Ho ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 278~283
In this paper, we designed and proposed framework of extended user model to support student tailored learning in ubiquitous environment. For the purpose, existents model that is domain model, user model, adaptation model and interaction model connected to LMS(Learning Management System) and LCMS(Learning Contents Management System). Students information management process that is extended user model is in between LMS and adaptive learning system. And the process connected u-LMS to use u-learning. u-LMS and u-LCMS could support the learning contents through exchange the contents according to connect and request from the students.
Intrusion Detection Algorithm based on Motion Information in Video Sequence
Kim, Alla ; Kim, Yoon-Ho ;
The Journal of Advanced Navigation Technology, volume 14, issue 2, 2010, Pages 284~288
Video surveillance is widely used in establishing the societal security network. In this paper, intrusion detection based on visual information acquired by static camera is proposed. Proposed approach uses background model constructed by approximated median filter(AMF) to find a foreground candidate, and detected object is calculated by analyzing motion information. Motion detection is determined by the relative size of 2D object in RGB space, finally, the threshold value for detecting object is determined by heuristic method. Experimental results showed that the performance of intrusion detection is better one when the spatio-temporal candidate informations change abruptly.