Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 10, Issue 12 - Dec 2006
Volume 10, Issue 11 - Nov 2006
Volume 10, Issue 10 - Oct 2006
Volume 10, Issue 9 - Sep 2006
Volume 10, Issue 8 - Aug 2006
Volume 10, Issue 7 - Jul 2006
Volume 10, Issue 6 - Jun 2006
Volume 10, Issue 5 - May 2006
Volume 10, Issue 4 - Apr 2006
Volume 10, Issue 3 - Mar 2006
Volume 10, Issue 2 - Feb 2006
Volume 10, Issue 1 - Jan 2006
Selecting the target year
Implementation of Anti-Collision Algorithm based on RFID System using FPGA
Lee, Woo-Gyeong ; Kim, Sun-Hyung ; Lim, Hae-Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 413~420
In this thesis, a RFID baseband system is implemented based on the international standard ISO/IEC 18000-6 Type-B using FPCA, and also anti-collision algorithm is implemented to improve the system performance. We compares the performance of the proposed anti-collision algorithm with that binary tree algorithm and bit-by-bit algorithm, and also validated analytic results using OPNET simulation. The proposed algorithm for Type-B transmission protocol and collision prohibition was designed using ISE7.1i which is a FPGA design-tool of Xilinx and implemented with Spartan2 chip which is a FPGA device.
Extended-CAN Mechanism to Support Keyword Search
Lee, Myoung-Hoon ; Park, Jung-Soo ; Cho, In-June ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 421~429
Recently, DHT-based Structured P2P System have a attention to scalability and providing efficient lookup by routing. Retrieving content of DHT-based P2P require knowledge of the exact identifier of sharing file. But user may wish to search for sharing file using descriptive keyword or content. To resolve the problem, this paper propose Extended-CAN mechanism to support keyword search. We defined content-based keyword and identifier of sharing file, and PLS extended to KID and CKD for keyword, common keyword processing. As a result, Extended-CAN mechanism provide efficient keyword search for DHT-based Structured P2P System.
A Revised QT Protocol for Tag Identification in RFID Systems
Lim, In-Taek ; Choi, Jin-Oh ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 430~436
In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. According to the simulation results, the QT_rev protocol outperforms the QT protocol in terms of the number of queries and the number of response bits.
An Implementation of Security Key Management System by LDAP
Yoon, Sung-Jung ; Kim, Geon-Ung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 437~445
The security key management function is a key element to secure network environment, and many protocols include IPSec, HIP, etc. demand this function. There are two solutions to provide the key management function in the network layer, one is a method for storing security key material in the directory, and the other is a method for storing security key material in DNS. In this paper we present an implementation of key management system by LDAP. We deployed the open source solutions for directory service(OpenLDAP), cryptographic algorithm (FLINT/C), IPSec(FreeS/WAN), and verified the key management system by the encrypted message exchange and the interoperability test by un daemon.
Performance Evaluation of Throughput of 802.11e MAC Protocol for Supporting Internet QoS
Byun, Tae-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 446~452
In this paper, I evaluated the throughput of various multimedia traffic by using computer simulation over wireless LAN environment based on 802.11e MAC protocol. The number of mobile terminals which generate various traffic and have different Internet QoS varies to improve the reliability of performance evaluation by simulation. Therefore, we investigate throughput of traffic that each mobile terminal generates. I expect that the result of study will be utilized as a fundamental data to control priorities of various types of traffic in case of formulating a scheduling policy supporting a variety of Internet QoS over wired and wireless networks.
Multi-quantized Image Compression using Wavelet Transform
Piao, Yong-Ri ; Kim, Seok-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 453~458
This paper proposed the method for restorable lossy mage compression using wavelet transformation. In order to increase compression efficiency, this algorithm subbands with the wavelet transformation filter after processing the pre-quantizer on the original images. Then, it quantizes its wavelet coefficients by using the Huffman Coding. Comparing to the JPEG or non pre-quantized images, the reconstructed images by the proposed algorithm showed higher PSNR. By applying pre-quantizing process, it will be possible to control the peak errors and it is also expected to be useful at mass image compressions.
Function approximation of steam table using the neural networks
Lee, Tae-Hwan ; Park, Jin-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 459~466
Numerical values of thermodynamic properties such as temperature, pressure, dryness, volume, enthalpy and entropy are required in numerical analysis on evaluating the thermal performance. But the steam table itself cannot be used without modelling. From this point of view the neural network with function approximation characteristics can be an alternative. the multi-layer neural networks were made for saturated vapor region and superheated vapor region separately. For saturated vapor region the neural network consists of one input layer with 1 node, two hidden layers with 10 and 20 nodes each and one output layer with 7 nodes. For superheated vapor region it consists of one input layer with 2 nodes, two hidden layers with 15 and 25 nodes each and one output layer with 3 nodes. The proposed model gives very successful results with
of percentage error for temperature, enthalpy and entropy and
for pressure and specific volume. From these successful results, it is confirmed that the neural networks could be powerful method in function approximation of the steam table.
Development of a Precision BLDC Servo Position Controller for Composite Smoke Bomb Azimuth Driving System
Koo, Bon-Min ; Choi, Sung-Jin ; Choi, Jung-Keyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 467~472
This study has been done to design a precise system and develop position control algorithm to control a Composite Smoke Bomb Azimuth driving apparatus of a BLDC servo motor. Having to Blind the sight of opposite tank. the Smoke Bomb Rotational driving system needs instant response that is able to detect opponent appearance and blast the bomb at a short time. So a design that shows fast current response capability or
is proposed. in the MIN-MAX PWM technology is used to increase the operational speed. in order to control the blasting position, a precision position control algorithm that utilizes the integral value of speed trajectory is suggested. Also these characteristics are monitored and assessed by the PC based monitoring program which shows the graphs of current, voltage, position, and speed parameters. The main controller is based on a TMS320VC33 high performance floating-point DSP(Digital Signal Process) and the PWM generator utilizes EPM7128 CPLD.
A Study on the Properties of Indium-Tin-Oxide(ITO) Films Deposited by DC magnetron sputtering method
An, Myung-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 473~478
High quality indium tin oxide (ITO) thin films have been prepared by DC magnetron sputtering technique. By controlling the deposition parameters such as substrate temperature and oxygen flow rate, we were able to minimize the negative ion damage during the deposition. Films pr데ared under such conditions were found to posses an excel]ent electrical resistivity of
and also found to have a optical transmission above 90%. We also observe that, increasing the oxygen now rate above 4 sccm leads to an increase in electrical resistivity of the films while the transmission was found to saturate with the increase in the oxygen gas flow.
Influence on Short Channel Effects by Tunneling for Nano structure Double Gate MOSFET
Jung, Hak-Kee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 479~485
The double gate(DG) MOSFET is a promising candidate to further extend the CMOS scaling and provide better control of short channel effect(SCE). DGMOSFETs, having ultra thin undoped Si channel for SCEs control, ale being validated for sub-20nm scaling. A novel analytical transport model for the subthreshold mode of DGMOSFETs is proposed in this paper. The model enables analysis of short channel effect such as the subthreshold swing(SS), the threshold voltage roil-off
and the drain induced barrier lowering(DIBL). The proposed model includes the effects of thermionic emission and quantum tunneling of carriers through the source-drain barrier. An approximative solution of the 2D Poisson equation is used for the distribution of electric potential, and Wentzel-Kramers-Brillouin approximation is used for the tunneling probability. The new model is used to investigate the subthreshold characteristics of a double gate MOSFET having the gate length in the nanometer range
with ultra thin gate oxide and channel thickness. The model is verified by comparing the subthreshold swing and the threshold voltage roll-off with 2D numerical simulations. The proposed model is used to design contours for gate length, channel thickness, and gate oxide thickness.
A Low-power EEPROM design for UHF RFID tag chip
Yi, Won-Jae ; Lee, Jae-Hyung ; Park, Kyung-Hwan ; Lee, Jung-Hwan ; Lim, Gyu-Ho ; Kang, Hyung-Geun ; Ko, Bong-Jin ; Park, Mu-Hun ; Ha, Pan-Bong ; Kim, Young-Hee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 486~495
In this paper, a low-power 1Kb synchronous EEPROM is designed with flash cells for passive UHF RFID tag chips. To make a low-power EEPROM, four techniques are newly proposed. Firstly, dual power supply voltages VDD(1.5V) and VDDP(2.5V), are used. Secondly, CKE signal is used to remove switching current due to clocking of synchronous circuits. Thirdly, a low-speed but low-power sensing scheme using clocked inverters is used instead of the conventional current sensing method. Lastly, the low-voltage, VDD for the reference voltage generator is supplied by using the Voltage-up converter in write cycle. An EEPROM is fabricated with the
EEPROM process. Simulation results show that power dissipations are
in the read cycle and
in the write cycle, respectively. The layout area is
Coverage metrics for high-level events in behavioral model verification
Kim, Kang-Chul ; Im, Chang-Gyun ; Ryu, Jae-Hung ; Han, Suk-Bung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 496~502
The complexity of IC has rapidly increased as VLSI fabrication technology has grown up quickly. This paper proposes verification methods for data conflicts and protocol between IPs for SoC with coverage metrics. The high-level events is defined to cooperation between blocks or process statement in HDL, or a sequence of performing a job compared to low-level event. They are classified into two categories, resource conflicts and protocol or specification-dependent conflicts. And two coverage metrics used for code coverage in low-level event are proposed to verify the hish-level events. The events of resource conflicts can be detected by using statement coverage metric if global signal or variable has flags in a testbench program, and protocol-dependent events can be checked by data flow metric or path metric.
Implementation of Readout IC for
Kim, Tae-Min ; Shin, Gun-Soon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 503~510
Readout circuit is to convert signal occurred in a defector into suitable signal for image signal processing. In general, it has to possess functions of impedance matching with perception element, amplification, noise reduction and cell selection. It also should satisfies conditions of low-power, low-noise, linearity, uniformity, dynamic range, excellent frequency-response characteristic, and so on. The technical issues in developing image processing equipment for focal plane way (FPA) can be categorized as follow: First, ultraviolet (UV) my detector material and fine processing technology. Second, ReadOut IC (ROIC) design technology to process electric signal from detector. Last, package technology for hybrid bonding between detector and ROIC. ROIC enables intelligence and multi-function of image equipment. It is a core component for high value added commercialization ultimately. Especially, in development of high-resolution image equipment ROIC, it is necessary that high-integrated and low-power circuit design technology satisfied with design specifications such as detector characteristic, signal dynamic range, readout rate, noise characteristic, ceil pitch, power consumption and so on. In this paper, we implemented a
FPA prototype ROIC for reduction of period and cost. We tested unit block and overall functions of designed
FPA ROIC. Also, we manufactured ROIC control and image boards, and then were able to verify operation of ROIC by confirming detected image from PC's monitor through UART(Universal Asynchronous Receiver Transmitter) communication.
Design of Digitalized SECAM Video Encoder with Modified Anti-cloche filter and SECAM Video Decoder with BPF and Error-free Square Root
Ha, Joo-Young ; Kim, Joo-Hyun ; Kang, Bong-Soon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 511~516
In this raper, we propose the Sequentiel Couleur Avec Memoire or Sequential Color with Memory (SECAM) video encoder system using modified anti-cloche filters and the SECAM video decoder system using a band pass filter (BPF) and an error-free square root. The SECAM encoder requires an anti-cloche filter recommended by International Telecommunication Union-Recommendation (ITU-R) Broadcasting service Television (BT) 470. However, the design of the anti-cloche filter is difficult because the frequency response of the anti-cloche filter is very sharp around rejection-frequency area. So, we convert the filter into a hish pass filter (HPF) by shifting the rejection frequency of 4.286MHz to 0Hz frequency. The design of HPF becomes very easy, compared to that of the anti-cloche filter. The proposed decoder also uses an error-free square root, two differentiators and trigonometric functions to extract color-component information of Db and Dr accurately from frequency modulation (FM) signals in SECAM systems. Also, the BPF in decoder it used for removing color noise in chrominance and dividing CVBS into chrominance and luminance. The proposed systems are experimentally demonstrated with Altera FPGA APEX20KE EP20K1000EBC652-3 device and TV sets.
Implementation of a Robust Visual Surveillance System for the Variation of Illumination Lights
Jung, Yong-Bae ; Kim, Jung-Hyeon ; Kim, Tae-Hyo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 517~525
In this paper, the algorithm which improve the efficiency of surveillance in spite of the change of light is proposed and confirmed by virtue of the experiments. One of the problems for the implementation of visual surveillance system is the image processing technique to overcome with the variations of illumination lights. Some conventional systems are generally not considered the error due to the change of lights because the system use at indoor. In practical, the factors of bad image can be classified to the ghosts due to the reflection of lights and shadows in a scene. Especially weak images and noises at night are decreased the performance of visual surveillance system. In the paper, the filter which improve the images with some change of illumination lights is designed and the gabor filter is used for recognition and tracking of the moving objects. In the results, the system showed that the recognition and tracking were obtained
of recognition rate at daytime, but
Iris detection using Hough transform and separable filter
Park, Ho-Sik ; Bae, Cheol-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 526~534
In this paper we propose a new algorithm to detect the irises of both eyes from a human face. Using the separability filter, the algorithm first extracts blobs(intensity valleys) as the candidates for the irises. Next, for each pair of blobs. the algorithm computes a cost usings Hough transform and separability later to measure the fit of the pair of blobs to the image. And then, the algorithm selects a pair of blobs with the smallest cost as the irises of both eyes. As the result of the experiment using 150 faces images without spectacles, the success rate of the proposed algorithm was 97.3% for the best case and 95.3% for the worst case.
A Robust Correspondence Using the Epipolar Geometry from Two Un-calibrated Images
Yoon, Yong-In ; Oh, In-Whan ; Doo, Kyoung-Soo ; Choi, Jong-Soo ; Kim, Jin-Tae ; Song, Ho-Keun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 535~541
This paper proposes a robust method to find corresponding points for un-calibrated stereo images by using a classical method based on the epipolar constraints and motion flows. If we detect matching for the only epipolar geometry, the problem is very high. Therefore, in order to nod an initial set of matches, we use the correlation technique and then exploit motion vectors to remove mismatches among matching candidates. Then, the epipolar geometry can be accurately estimated using a veil adapted criterion and computed the fundamental matrix. The proposed algorithm has been widely tested and works remarkably well in various scenes, evenly, with many repetitive patterns. The results show that the proposed algorithm is better than the conventional.
Face Region Detection and Verification using both WPA and Spatially Restricted Statistic
Song, Ho-Keun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 542~548
In this paper, we propose a face region detection/verification method using wavelet packet analysis and structural statistic for frontal human color image. The method extracts skin color lesions from input images, first. and then applies spatial restrictive conditions to the region, and determines whether the region is face candidate region or not. In second step, we find eye region in the face candidate region using structural statistic for standard korean faces. And in last step, the face region is verified via wavelet packet analysis if the face torture were satisfied to normal texture conditions.
A Study on the step edge detection method based on image information measure and eutral network
Lee, S.B. ; Kim, S.G. ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 549~555
An edge detection is an very important area in image processing and computer vision, General edge detection methods (Robert mask, Sobel mask, Kirsh mask etc) are a good performance to detect step edge in a image but are no good performance to detect step edge in a noses image. We suggested a step edge detection method based on image information measure and neutral network. Using these essential properties of step edges, which are directional and structural and whose gray level distribution in neighborhood, as a input vector to the BP neutral network we get the good result of proposed algorithm. And also we get the satisfactory experimental result using rose image and cell images an experimental and analysing image.
The Extraction of Table Lines and Data in Document Image
Jang, Dae-Geun ; Kim, Eui-Jeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 556~563
We should extract lines and data which consist of the table in order to classify the table region and analyze its structure in document image. But it is difficult to extract lines and data exactly because the lines are cut and their lengths are changed, or characters or noises are merged to the table lines. These problems result from the error of image input device or image reduction. In this paper, we propose the better method of extracting lines and data for table region classification and structure analysis than the previous ones including commercial softwares. The prposed method extracts horizontal and vertical lines which consist of the table by the use of one dimensional median filter. This filter not only eliminates the noises which attach to the line and the lines which are orthogonal to the filtering direction, but also connects the cut line of which the gap is shorter than the length of the filter tap in the process of extracting lines to the filtering direction. Furthermore, texts attached to the line are separated in the process of extracting vertical lines. This is an example of ABSTRACT format.
Timing Optimization of Real-Time System Design for Embedded Systems
Park, Eun-Jung ; Jeong, Tai-Kyeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 564~570
This paper presents a new real-time system design methodology for embedded system as well as event-driven real time application. It is required to implement a deadline handling mechanism in order to satisfy a large-scale distributed real time application. When we design real time system, it has handled a deadline and is important to measure / control a timing issue. These timing constraints usually associated with an interface between model and system. There are many case tools that supporting a real time application, for example, UML, graphic language for designing real time system, but they cannot provide efficient way to handle deadline miss. Therefore, users have to design deadline handler manually when they need to use it. This paper contributes solving the problems of user-level deadline handling for an embedded system. Also, it also discusses an efficient deadline handler design mechanism using on RoseRT, which is a graphical CASE tool supporting from UML.
A Renewal Mechanism of Group Key on Digital Mobile Communication Employing the Fiat-shamir Method
Tak, Dong-Kil ; Chung, Il-Yong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 571~578
To renew the group key securing on the mobile communication needs that it can be not oかy re-shared by all members of the group with the exception of members excluded but also prevented from making a fraudulent use of a terminal's registered key because of a leakage of information from the loss of terminal. In this paper, we propose an efficient renewal mechanism of group key in order for all members of the group to be able to get digital information and to perform the renewal of group key in a small-scale conference employing the Fiat-Shamir method. It can guarantee the security of terminals, since a terminal generates security information needed for key renewal, and then renews the group key for mutual communication.
Receive Sensitivity Improvement of Wavelength Division Multiplexing System
Kim, Sun-Youb ; Park, Hyoung-Keun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 579~585
In this study, we analysis an optical receivers using the optical preamplifier in a spectrum-sliced WDM systems. The average numbers of photons/bit, for an
error probability, counts using the OOK and FSK transmission. As a result, the theoretical sensitivity for PIN receiver and optical preamplifier receiver are approximately
in the m=20, respectively. Also, the average numbers of photons/bit, for and given error probability, theoretical receiver sensitivity for Gaussian method and k-square method are approximately
in the m=40, respectively. And the average numbers of photons/bit, for an given error probability, theoretical receiver sensitivity, OOK and FSK transmission are approximately
in the m=20, respectively.
Deriving the Success Factors for Retailing Mobile Services: A Comparison of Mobile Service Types
Kim, Keun-Hyung ; Kim, Si-Yeon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 586~592
Mobile Services are that function of information system are served in mobile environment. So, Success model for the mobile services might be derived through mixing success model of information system with mobile attributes. There are many kinds of mobile services. Specially, commerce, communication entertainment and information services are representative types in mobile services. In this paper, we do not only derive important factors that influence success of mobile services, but also analyze how the factors influence the success of mobile services. We also analyze whether measures of the factors might differ significantly among the types of mobile services.
A Study on the Edge Detection for Road Information based on the IKONOS
Choi, Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 593~598
High-resolution satellite imagery has many benefits, compared to aerial photo in the wide area as well as multi-spectral character. So, it can be used well for constructing GIS data when making digital map. This study analysed the possibilities that road information derived automatically from IKONOS can be used for making ITS system or updating digital map of the urban areas where change frequently and producing satellite image map. In this study, Sobel was applied for road edge dectection after low pass filtering. As the results, it's possible for low pass filtering and high pass filtering to be used as the basic data for ITS construction when extracting edge roads and constructs according to the characteristic of high-resolution satellite imagery.
A Study for Tonal Signal Automatic Classification of Ship-Radiated Noise
Lee, Phil-Ho ; Park, Kyu-Chil ; Yoon, Jong-Rak ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 599~607
The ship radiated noise appear the various characteristic signals due to the mechanic system in the ship, the propeller and the interaction between ship body and sea water. Generally, it is classified two main components: the speed dependent signal and the speed independent signal. It is required that very complex procedure to classify the signal origin from the ship-radiated noise. This paper presents techniques to automatically detect and classify the tonal signals ken the ship-radiated noise, using the Q factor and the neural network.
Recommending System of Products based on Data mining Technique
Jung, Min-A. ; Park, Kyung-Woo ; Cho, Sung-Eui ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 608~613
There are many e-showing mall because of revitalization of e-commerce system. It is necessary to recommending system of products that is for saving time and effort of customer. In this paper, we propose the system that is applying classification among data mining techniques to analysis of log data of customer. This log data contains access of user and purchasing of products. The proposed system operates in two phases. The first phase is composed of data filter module and association extraction module among web pages. The second phase is composed of personalization module and rule generation module. Customer can easily know the recommended sites because the proposed system can present rank of the recommended web pages to customer. As a result, the proposed system can efficiently do recommending of products to customer.
Integrating Multiple Classifiers in a GA-based Inductive Learning Environment
Kim, Yeong-Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 614~621
We have implemented a multiclassifier learning approach in a GA-based inductive learning environment that learns classification rules that are similar to rules used in PROSPECTOR. In the multiclassifier learning approach, a classification system is constructed with several classifiers that are obtained by running a GA-based learning system several times to improve the overall performance of a classification system. To implement the multiclassifier learning approach, we need a decision-making scheme that can draw a decision using multiple classifiers. In this paper, we introduce two decision-making schemes: one is based on combining posterior odds given by classifiers to each class and the other one is a voting scheme based on ranking assigned to each class by classifiers. We also present empirical results that evaluate the effect of the multiclassifier learning approach on the GA-based inductive teaming environment.
New Population initialization and sequential transformation methods of Genetic Algorithms for solving optimal TSP problem
Kang, Rae-Goo ; Lim, Hee-Kyoung ; Jung, Chai-Yeoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 10, issue 3, 2006, Pages 622~627
TSP(Traveling Salesman Problem) is a problem finding out the shortest distance out of many courses where given cities of the number of N, one starts a certain city and turns back to a starting city, visiting every city only once. As the number of cities having visited increases, the calculation rate increases geometrically. This problem makes TSP classified in NP-Hard Problem and genetic algorithm is used representatively. To obtain a better result in TSP, various operators have been developed and studied. This paper suggests new method of population initialization and of sequential transformation, and then proves the improvement of capability by comparing them with existing methods.