Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Advanced Navigation Technology
Journal Basic Information
Journal DOI :
The Korea Navigation Institute
Editor in Chief :
Volume & Issues
Volume 17, Issue 6 - Dec 2013
Volume 17, Issue 5 - Oct 2013
Volume 17, Issue 4 - Aug 2013
Volume 17, Issue 3 - Jun 2013
Volume 17, Issue 2 - Apr 2013
Volume 17, Issue 1 - Feb 2013
Selecting the target year
An Onboard Multilateration system for Efficient Air Traffic Management
Cho, Tae-Hwan ; Song, In-Seong ; Jang, Eun-Mee ; Yoon, Wan-Oh ; Choi, Sang-Bang ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 1~8
DOI : 10.12673/jkoni.2013.17.01.001
In the next generation of ATM, ADS-B(Automatic Dependent Surveillance-Broadcast) and multilateration are the main technology recommended by ICAO(International Civil Aviation Organization). However, there are a lot of non-equipped ADS-B aircraft today. Therefore, TIS-B(Traffic Information Service-Broadcast) provides traffic information, which has obtained from radars for non-equipped ADS-B aircraft. In this paper, we presented an onboard multilateration system for non-equipped ADS-B aircraft using SSR(Secondary Surveillance Radar) signal instead of TIS-B. TIS-B has a lot of error because of using radar data, but multilateration has less error than radar because of using TDOA(Time Difference of Arrival) method. Results of performance analysis show that the position accuracy is improved by the proposed method using on-board multilateration.
A propose of Big data quality elements
Choi, Sang-Kyoon ; Jeon, Soon-Cheon ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 9~15
DOI : 10.12673/jkoni.2013.17.01.009
Big data has a key engine of the new value creation and troubleshooting are becoming more data-centric era begins in earnest. This paper takes advantage of the big data, big data in order to secure the quality of the quality elements for ensuring the quality of Justice and quality per-element strategy argue against. To achieve this, big data, case studies, resources of the big data plan and the elements of knowledge, analytical skills and big data processing technology, and more. This defines the quality of big data and quality, quality strategy. The quality of the data is secured by big companies from the large amounts of data through the data reinterpreted in big corporate competitiveness and to extract data for various strategies.
Compensation Characteristics of WDM Signals Depending on Dispersion Coefficient of Dispersion Compensating Fiber and Residual Dispersion Per Span
Lee, Seong-Real ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 16~23
DOI : 10.12673/jkoni.2013.17.01.016
The effects of dispersion coefficient of dispersion compensating fiber (DCF) and residual dispersion per span (RDPS) on in the dispersion managed optical links for compensating the distorted 960 Gbps wavelength division multiplexd (WDM) signals due to group velocity dispersion (GVD) and optical nonlinear effects of single mode fiber (SMF) are investigated. It is confirmed that optimal net residual dispersion (NRD), which greatly affects compensating for optical signals, should be induced under the large launch power condition, irrelevant on the considered dispersion coefficient of DCF and RDPS. It is also confirmed that system performances are greatly improved by selecting the very small RDPS and very large dispersion coefficient of DCF.
Enhancement of Password-based Mutual Authentication Protocol against De-synchronization Attacks
Yuk, Hyeong-Jun ; Yim, Kang-Bin ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 24~32
DOI : 10.12673/jkoni.2013.17.01.024
Authentication is one of the necessary elements in the network environment. Many researches have detected security vulnerabilities to the existing authentication mechanisms and suggested secure mutual authentication protocols by resolving these vulnerabilities. The representative ones of them are SPMA(Strong Pass Mutual Authentication) and I-SPMA(Improved Strong Password Mutual Authentication). However, these protocols cause a critical problem when the shared secret information is de-synchronized between the server and the client. This paper proposes a revised protocol to resolve the de-synchronization problem. Based on a security assessment on the proposed protocol, we consider the proposed protocol is safer than the previous ones and possible to effectively make a user authentication system mre secure.
Dual-band Gysel Power Divider based on Filter Conversion Technique
Yoo, Jae-Hyun ; Kim, Young ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 33~38
DOI : 10.12673/jkoni.2013.17.01.033
In this paper, we present the design and measured performances of an dual-band Gysel power divider based on band-stop characteristic. After the Gysel divider is designed by lumped elements at single operating frequency, and then using filter conversion technique the lumped elements were changed a band-stop characteristic with dual-band characteristics. The features of this design method are that
transmission line by replacing lumped elements suppressed harmonic characteristics and also can reduce the size. To validate of the proposed power divider, the divider has been designed and measured at 880 MHz and 1650 MHz dual frequencies. The measured performances of the Gysel divider agree with prediction results at two frequencies.
Performance Evaluation on Journaling File Systems using Iozone Tool in the Linux : Focus on read, write
Park, Hong-Jin ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 39~46
DOI : 10.12673/jkoni.2013.17.01.039
If a file system is damaged because of the unusual system close, the system performs the consistency test using fsch and it takes long time. Especially, if it is a big file system, it will take a lot of time. The journaling file system that uses journaling technique, can reduce the restoring time because it uses meta data and it may increase the chance of restoration when restoring. The goal of this paper compared performance evaluation journaling file systems focused on the reading and writing using Iozone tool which is the kernel based benchmarking tool in linux operating system. In this paper, Ex4 which is the current basic Linux file system. is 1.28x faster than XFS file system in terms of file read performance and 1.22x faster than Ext3 file system in terms of file write performance.
Design of MD Authentication and Privacy for Mobile Micro-payment based on NFC
Kim, Yong-Il ; Kim, Dae-Gue ; Cha, Byung-Rae ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 47~55
DOI : 10.12673/jkoni.2013.17.01.047
In this paper, we propose the micropayment model based on NFC, authentication, and privacy technique to support micro-payment in aspect of information technology to reinvigorate the traditional market. The micropayment model supports facilities of payment using smart phone based on NFC, and the encryption and tokenization support the functions of MD authentication, indirection authentication, and privacy of user`s payment.
A Study on the Efficient Power Consumption of Next Generation Mobile Communication Systems
Roh, Jae-Sung ; Kim, Wan-Tae ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 56~62
DOI : 10.12673/jkoni.2013.17.01.056
Recently with smart phones and tablets, next generation mobile communication systems have supported various multimedia contents services. Thus, multimedia communication systems have been gradually increased compared to voice communication systems. Since the growth of multimedia services has increased users` duration on systems and decreased systems` effectiveness on power, a study on effective usage of power needs to be researched. Furthermore, radio shadow areas under heavy urban environments have generated unnecessary power consumption which reduces the usage duration of power on next generation mobile communication systems. This paper has reviewed the communication network architecture on next generation mobile communication systems and the unnecessary power consumption in radio shadow areas. This paper has also proposed the method of the effective power usage and analyzed the effective power usage on next generation mobile communication systems with simulation.
Digital Forensics Framework for Cloud Computing
Lee, Chang-Hoon ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 63~68
DOI : 10.12673/jkoni.2013.17.01.063
Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user`s log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.
Hardware Implementation of DCT and CAVLC for H.264/AVC based on Co-design
Wang, Duck-Sang ; Seo, Seok-Yong ; Ko, Hyung-Hwa ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 69~79
DOI : 10.12673/jkoni.2013.17.01.069
In this paper, DCT(Discrete Cosine Transform) and CAVLC(Context Adaptive Variable Length Coding) are co-designed as hardware IP with software operation of the other modules in H.264/AVC codec. In order to increase the operation speed, a new method using SHIFT table is proposed. As a result, enhancement of about 16(%) in the operation speed is obtained. Designed Hardware IPs are downloaded into Virtex-4 FX60 FPGA in the ML-410 development board and H.264/AVC encoding is performed with Microblaze CPU implemented in FPGA. Software modules are developed from JM13.2 to make C code. In order to verify the designed Hardware IPs, Modelsim program is used for functional simulation. As a result that all Hardware IPs and software modules are downloaded into the FPGA, improvement of processing speed about multiples of 16 in case of DCT hardware IP and multiples of 10 in case of CAVLC compared with software-only processing. Although this paper deals with co-design of H/W and S/W for H.264, it can be utilized for the other embedded system design.
Analyses for Re-entry Event and Survival characteristics according to Characters of Re-entering Space Objects
Jeong, Soon-Woo ; Min, Chan-Oh ; Lee, Dae-Woo ; Cho, Kyeum-Rae ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 80~89
DOI : 10.12673/jkoni.2013.17.01.080
The amount of object which reenter the Earth`s atmosphere has been increasing after the Sputnik I launch in October 1957. Most of reentry objects were incinerated by aerodynamic heating so they hardly survive. But they may incur casualties and widespread property damages if they survive and fall to surface. The amount of reentry objects, such as Satellite, Rocket Booster, Pressure Tank, ISS shows continued growth as byproduct of space activities. Most of the re-entry objects are incinerated at between altitude of 50km~80km and 10%~40% of the objects are surviving and falling to the ground. Therefore, this paper try to piece together the reentry event and analysis the survival characteristics of re-entry object.
Traffic Collision Detection at Intersections based on Motion Vector and Staying Period of Vehicles
Shin, Youn-Chul ; Park, Joo-Heon ; Lee, Myeong-Jin ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 90~97
DOI : 10.12673/jkoni.2013.17.01.090
Recently, intelligent transportation system based on image processing has been developed. In this paper, we propose a collision detection algorithm based on the analysis of motion vectors and the staying periods of vehicles in intersections. Objects in the region of interest are extracted from the subtraction image between background images based on Gaussian mixture model and input images. Collisions and traffic jams are detected by analysing measured motion vectors of vehicles and their staying periods in intersections. Experiments are performed on video sequences actually recoded at intersections. Correct detection rate and false alarm rate are 85.7% and 7.7%, respectively.
Moving Object Detection and Tracking in Multi-view Compressed Domain
Lee, Bong-Ryul ; Shin, Youn-Chul ; Park, Joo-Heon ; Lee, Myeong-Jin ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 98~106
DOI : 10.12673/jkoni.2013.17.01.098
In this paper, we propose a moving object detection and tracking method for multi-view camera environment. Based on the similarity and characteristics of motion vectors and coding block modes extracted from compressed bitstreams, validation of moving blocks, labeling of the validated blocks, and merging of neighboring blobs are performed. To continuously track objects for temporary stop, crossing, and overlapping events, a window based object updating algorithm is proposed for single- and multi-view environments. Object detection and tracking could be performed with an acceptable level of performance without decoding of video bitstreams for normal, temporary stop, crossing, and overlapping cases. The rates of detection and tracking are over 89% and 84% in multi-view environment, respectively. The rates for multi-view environment are improved by 6% and 7% compared to those of single-view environment.
Design of PID Type Fuzzy Logic Acceleration Controller for Turbojet Engine Using High-gain Observer
Jie, Min-Seok ; Kim, Dae-Gi ; Hong, Gyo-Young ; Ahn, Dong-Man ; Hong, Seung-Beom ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 107~114
DOI : 10.12673/jkoni.2013.17.01.107
In this paper, we propose controller to control the acceleration of unmanned aircraft turbojet engine. The high-gain observer to estimate the rotational speed of compressor is used, and the turbojet engine controller applying fuzzy heuristic techniques and PID control algorithm are designed. fuzzy PID controller produces the flow control input to prevent the surge and flame-out phenomena at the acceleration and deceleration of the turbojet engine. The standard acceleration is set and the fuel flow control is defined by the fuzzy heuristic. Computer simulations are performed using MATLAB in order to verify the performance of the proposed controller.
Automatic Carotid Artery Image Segmentation using Snake Based Model
Chaudhry, Asmatullah ; Hassan, Mehdi ; Khan, Asifullah ; Choi, Seung Ho ; Kim, Jin Young ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 115~122
DOI : 10.12673/jkoni.2013.17.01.115
Disease diagnostics based on medical imaging is getting popularity day by day. Presence of the atherosclerosis is one of the causes of narrowing of carotid arteries which may block partially or fully blood flow into the brain. Serious brain strokes may occur due to such types of blockages in blood flow. Early detection of the plaque and taking precautionary steps in this regard may prevent from such type of serious strokes. In this paper, we present an automatic image segmentation technique for carotid artery ultrasound images based on active contour approach. In our experimental study, we assume that ultrasound images are properly aligned before applying automatic image segmentation. We have successfully applied the automatic segmentation of carotid artery ultrasound images using snake based model. Qualitative comparison of the proposed approach has been made with the manual initialization of snakes for carotid artery image segmentation. Our proposed approach successfully segments the carotid artery images in an automated way to help radiologists to detect plaque easily. Obtained results show the effectiveness of the proposed approach.
An Exploratory Study of Industrial Security Studies for Science and Technologies Protection
Chang, Hang-Bae ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 123~131
DOI : 10.12673/jkoni.2013.17.01.123
If Industrial state-of-the-art technology that made through IT convergence should be to build safely environment that can protect then IT technology and manufacturing industry become convergence and a growth engine become stable positioning. In each industry, there has been a steady effort for the industrial security. However, they introduced only managerial/technical/physical countermeasures. Therefore, it is difficult to find a reference point as industrial security necessity, protecting coverage and things and so on. It is to lack that academic research in industrial security for protecting industrial technology. In detail, a clear definition lack for industrial security. And target range classification lack for industrial security studies. In this study, we redefined the concept of industry security through previous studies. Academic classification designed industrial security studies through delphi method. we analyzed industry security trends based industrial security studies classification and presented domestic industry research orientations.
A Study on Drive in Extending Break Power of The PMSM using series Resistor
Hwang, Lark-Hoon ; Na, Seung-Kwon ; Kim, Young-Bog ; Chung, Nam-Kil ;
The Journal of Advanced Navigation Technology, volume 17, issue 1, 2013, Pages 132~141
DOI : 10.12673/jkoni.2013.17.01.132
In this paper, method using electric braking from stop area to high-speed area was presented in order to improve air-brake. And electric braking method can be improved environmental problems, efficiency, economy, etc. Method for electrical complete braking are two ways that method of inserting series resistance between the motor and the inverter, and method of inverter output voltage increase. In this paper, use series resistance insert method because economical and easy to apply. In addition, Series resistor is used short circuit method for reduce the power loss. In improved efficiency and the laboratory environment for secure braking, resistance insert method and inverter output voltage increase method showed same characteristics in all areas.