Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 12, Issue 12 - Dec 2008
Volume 12, Issue 11 - Nov 2008
Volume 12, Issue 10 - Oct 2008
Volume 12, Issue 9 - Sep 2008
Volume 12, Issue 8 - Aug 2008
Volume 12, Issue 7 - Jul 2008
Volume 12, Issue 6 - Jun 2008
Volume 12, Issue 5 - Apr 2008
Volume 12, Issue 4 - Apr 2008
Volume 12, Issue 3 - Mar 2008
Volume 12, Issue 2 - Feb 2008
Volume 12, Issue 1 - Jan 2008
Selecting the target year
The Design of Ultra-Wide Band(UWB) Band Pass Filter with WLAN Notched Band of DGS(Defected Ground Structure)-Type
Kim, Kab-Ki ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1909~1913
In this paper, A compact ultra-wideband(UWB) bandpass filter(BPF) with WLAN notched filter has been proposed. H-shared slot is studied and adopted to tighten the coupling of inter-digital capacitor in order to improve the BPF's performance. Three pairs of tapered defected ground structures(DGS) are formed to assign their transmission zeros towards the out of band signal, thereby suppressing the spurious passband. Also Meander line slot is de#eloped to reject the undesired wireless local-area network(WLAN) radio signals. That's combining these three structures we obtain a small sized UWB BPF.
A Study on the Mean Variations of EEG for the Indirect Moxibustion Stimulation
Song, Hong-Bok ; Yoon, Dong-Eop ; Park, Dong-Hee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1914~1922
In this paper, examined characteristics of EEG(electroencephalogram) variation when the stimulation was given to lung-wan(CV12), Shin-gwol(CV8) and Gwan-won(CV4) which were some of the acupuncture point, through indirect moxibustion and No stimulation. The EEG signals were measured before the stimulation, during the stimulation, and 1 hour after the stimulation. The measured time domain data were converted to the frequency domain data FFT(Fast Fourier Transform) and frequency power spectrum. Then the
waves were analyzed for variation to the amplitude of vibration according to the stages of stimulation.
A Development of Object Shape Recognition Module using Laser Sensor
Kwak, Sung-Hwan ; Lee, Seung-Kyu ; Lee, Seung-Jae ; Oh, Kyu-Hyun ; Kim, Young-Sik ; Choi, Joong-Koung ; Park, Mu-Hun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1923~1932
In this paper, We suggest a method, which extract the 3-Dimension location coordinate of object, stat and coil, using Laser sensor. In order to extract the 3-Dimension location coordinate of object, First, we extract the edge of object. Second, extract the z-axis angle of Laser sensor. Third, extract the 2-Dimension location coordinate of object using edge of object and z-axis of Laser senor. Fourth, discriminate between Slat and Coil. The result of study is expected that the help which is considerable to the automation system development of unmanned transportation equipment will become.
Wavelet Shift Keying System Using a Binary Matching Filter
Oh, Hyoung-Jin ; Jeong, Tae-Il ; Lee, Tae-Oh ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1933~1938
There are the frequency shift keying(FSK), phase shift keying(PSK) and amplitude shift keying(ASK) in the conventional digital communications method. In this parer, We proposed the algorithm for wavelet shift keying system using a binary matching filter in the digital communication. Wavelet shift keying system are used to a scaling function(low frequency) and wavelet(high frequency) coefficients. The binary data is encoded by modulator which assigned the scaling function to 1(one), and wavelet to zero(0). Wavelet shift keying of the conventional method needs to a post-processing for the decoding. In this paper, wavelet shift keying signal is reconstructed by the decoder using a binary matching filter. So, it was able to the decoding without the post-processing. It was demonstrated by the experiment that the proposed algorithm is a validity.
A Study on the Automated Positioning based Monitoring System to prevent the oceanic ecosystem destruction
Moon, Myung-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1939~1946
The Oceanic ecosystem destruction caused by Water-Bloom, Jellyfish development, and Oil contamination in nation's waters becomes serious problem. For these reasons, the oceanic conditions are observed in air and on the water using helicopters and vessels. But, employing helicopters and vessels are limitted on a budget, and weather conditions. To overcome these problems, an unattended automated monitoring system not only gather all sorts of the oceanic condition in spite of bad weather, but save labor and oil costs. For each sensor connected in network and radiodetermination, location of sensors are verified in the tidal water to improve gathering informations.
A Study on a Tester System for the Next Generation Convergence Network
Lee, Kyou-Ho ; Sung, Kil-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1947~1953
This paper studies a system design of testifying next generation convergence network. Next generation convergence network includes such elements as not only various gateway systems interworking with conventional PSTN(Public Switched Telephone Network) but also various protocols communicating between gateway systems and softswitches or gateway controllers. Discussed are an effective system solution to verify functionalities and performance of protocols professing. From such discussion, the study identifies functional blocks and operational flows required for establishing a test system, and then with a basis of these proposes a system architecture. Finally this paper presents system design results and its implemented functional details.
A Self-Regulated Robot System using Sensor Network
Park, Chul-Min ; Jo, Heung-Kuk ; Lee, Hoon-Jae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1954~1960
Modem Robot is used in all industries. Previous Robot was used by simplicity work, at recent times, robot is developed in form that can do action such as a person. Robot's action runs according to command repeat or in the every moment according to sensor's output value, achieve other action. In this raper, we studied about self-regulation transfer robot that follow Object autonomously. This robot can be used by purpose that carry heavy burden instead of human. Robot's composition is drive part which run object's position awareness Sensor, Processor that control action and Motor part. After robot is connects with Network, we did robot remote control and monitor the action situation of robot. For the methode to reduce drive error, we developed algorithm for outside environment. For an experiment we made the self-regulation robot. We showed the directivity of sensor, error of directivity and soft moving of robot. We showed the monitoring system and the execution screen for communication between robot and PC.
A study on Handover Performance of Mobile IPv6 on Mobile IPv6 testbed
Kim, Dong-Il ; Kim, Kwang-Deok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1961~1965
During communication between wireless users, disconnection may occur during the handover process. The high handover latency during the process of handover degrades the service quality of the wireless communications. This problem becomes more crucial if the operation network is transmitting real-time multimedia applications. This paper studies the hanover procedure of mobile IPv6 and investigates various factors affecting the handover latency through mobile IPv6 testbed and evaluates the various parameters for reducing the handover latency.
Route Optimization Scheme using Routing Protocol in Nested Mobile Networks
Kim, Eui-Kook ; Lee, Jong-Hyup ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1966~1975
NEMO Basic Support Protocol standardized in IETF provides the seamless communication environment to all nodes within the mobile network regardless of the network movement while the network is moving. According to the standard, when the mobile network moves outside of its home network the network can make use of the binding update message or dynamic routing protocol in order to register the mobility information into the Home Agent(HA). But because these two methods don't consider the route optimization, all packets destined to Mobile Network Nodes(MNNs) attached into the Mobile Router(MR) have to go through HAs of MRs so that they bring on the transmission delay and the waste of the bandwidth. This situation is to be worse and causes the packet fragmentation problem if MRs within the mobile network are nested. Even though there have been some researches about the route optimization to recover the problems, they have problems in the packet transmission performance side. In this paper, we propose a new scheme to improve the network performance by using a dynamic routing protocol and minimizing the number of HAs on the end-to-end path. Various performance evaluations show that the proposed mechanism gives better performance in view of the packet transmission compared to the existing schemes.
Design of a Binary Adder Structure Suitable for High-Security Public Key Cryptography Processor
Moon, Sang-Gook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1976~1979
Studies on binary adder have been variously developed. According to those studies of critical worst delay and mean delay time of asynchronous binary adders, carry select adders (CSA) based on hybrid structure showed 17% better performance than ripple carry adders (RCA) in 32 bit asynchronous processors, and 23% better than in 64 bit microprocessor implemented. In the complicated signal processing systems such as RSA, it is essential to optimize the performance of binary adders which play fundamental roles. The researches which have been studied so far were subject mostly to addition algorithms or adder structures. In this study, we analyzed and designed adders in an asp;ect of synthesis method. We divided the ways of implementing adders into groups, each of which was synthesized with different synthesis options. Also, we analyzed the variously implemented adders to evaluate the performance and area so that we can propose a different approach of designing optimal binary adders.
Design of robust Medical Image Security Algorithm using Watershed Division Method
Oh, Guan-Tack ; Jung, Min-Six ; Lee, Yun-Bae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1980~1986
A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of lading any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST transformation and other processing. This algorithm also proved that is has robustness against not only RST attack, but also JPEG compression attack and filtering attack.
Development of Cable Management System for Ship
Lee, Jae-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1987~1992
In recent years, the shape of ship building have been advanced. Thus the system is complex and cable is much used in ship. In this paper, Dijkstra algorithm is used to solve the shortest path of cable laying. Cable laying is given much weight in fable management system of ship. The developed cable management system is cut down on expenses and is improve the operation efficiency for ship building. Therefore, the developed cable management system can be used a support system in order to achieve a management target of company.
Implementation of Web Searching Robot for Detecting of Phishing and Pharming in Homepage
Kim, Dae-Yu ; Kim, Jung-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1993~1998
Web robot engine for searching web sever vulnerability and malicious code is proposed in this paper. The main web robot function is based on searching technology which is derived from analyses of private information threat. We implemented the detecting method for phishing, pharming and malicious code on homepage under vulnerable surroundings. We proposed a novel approachm which is independent of any specific phishing implementation. Our idea is to examine the anomalies in web pages.
Comparison of DBMS Performance for processing Small Scale Database
Jang, Si-Woong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 1999~2004
While a lot of comparisons of DBMS performance for processing large scale database are given as results of bench-mark tests, there are few comparisons of DBMS performance for processing small scale database. Therefore, in this study, we compared and analyzed on the performance of commercial DBMS and public DBMS for small scale database. Analysis results show that while Oracle has low performance on the operations of update and insert due to the overhead of rollback for data safely, MySQL and MS-SOL have good performance without additional overhead.
UPnP Services for RFID Context-Aware System
Kim, Dong-Kyun ; Jeon, Byung-Chan ; Lee, Sang-Jeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2005~2014
In this paper, it is presented to utilize UPnP as RFID service discovery and control mechanism for context-aware services. Using UPnP, it is possible to achieve easy deployment of context-aware services and to provide zero-configuration for RFID services. In addition, SQL based cleaning module which raises detection rates is developed since context-aware applications heavily rely on streams of data gathered from RFID tags. Using the cleaning technique, detection rates are improved from 60-80% to 98% or more In order to verify RFID context aware service based on the UPnP, sample context-aware scenario for physical distribution services is implemented on UPnP over RFID system. The impacts of UPnP messages (or service advertisements on network congestion and SQL cleaning module are experimented and analyzed, and the result show the good correctness and validity of the proposed system.
Multi-level Converter for Low EMI and High Quality Output Voltage
Lee, Sang-Hun ; Lee, Min-Jung ; Park, Sung-Jun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2015~2021
Recently, with the growth of photovoltaic system, many researchers and companies have concerned about the multi-level inverter which has an efficiency of boosting voltage. In this paper a novel structure of multi-level converter for reducing ripple of output voltage is proposed. In the proposed converter Buck converters are connected in series to generate the output voltage and the ripple of output voltage can be reduced compared with the exiting Buck converter. Especially when outputting lower output voltage the number of acting switching elements is less and the result of ripple reducing is more obvious. This paper implements a multi-level switching function based on the FPGA.
A Multi-point I/O module development that utilize PC's LAN card and Switching
Kim, Tae-Min ; Jeon, Yoon-Han ; Shin, Gun-Soon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2022~2030
System such as FA and breakup TC is applied by real time and need to manage. This paper studies data processing skill that can divide TC and data of much quantity with collection by real time. Modularize to several system, and use of computer communication network that interlink computers that can achieve control function of each systems to network is spreading. Develop that can take advantage of Ideonet communication method and transmit signal of channel because do multiplex all. Do data that have semi-conductor equipment or many input of LCD equipment and output node multiplex, and several units real time Ideonet communication that control is available use that all input of point of contact and output module develop.
A Design of Authentication/Security Processor IP for Wireless USB
Yang, Hyun-Chang ; Shin, Kyung-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2031~2038
A small-area and high-speed authentication/security processor (WUSB_Sec) IP is designed, which performs the 4-way handshake protocol for authentication between host and device, and data encryption/decryption of wireless USB system. The PRF-256 and PRF-64 are implemented by CCM (Counter mode with CBC-MAC) operation, and the CCM is designed with two AES (Advanced Encryption Standard) encryption coles working concurrently for parallel processing of CBC mode and CTR mode operations. The AES core that is an essential block of the WUSB_Sec processor is designed by applying composite field arithmetic on AF
. Also, S-Box sharing between SubByte block and key scheduler block reduces the gate count by 10%. The designed WUSB_Sec processor has 25,000 gates and the estimated throughput rate is about 480Mbps at 120MHz clock frequency.
Design of Bit-Pattern Specialized Adder for Constant Multiplication
Cho, Kyung-Ju ; Kim, Yong-Eun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2039~2044
The problem of an efficient hardware implementation of multiple constant multiplication is frequently encountered in many digital signal processing applications such as FIR filter and linear transform (e.g., DCT and FFT). It is known that efficient solutions based on common subexpression elimination (CSE) algorithm can yield significant improvements with respect to the area and power consumption. In this paper, we present an efficient specialized adder design method for two common subexpressions (
, 101) in canonic signed digit (CSD) coefficients. By Synopsys simulations of a radix-24 FFT example, it is shown that the proposed method leads to about 21%, 11% and 12% reduction in the area, propagation delay time and power consumption compared with the conventional methods, respectively.
A design of High-Profile Intra Prediction module for H.264
Suh, Ki-Bum ; Lee, Hye-Yoon ; Lee, Yong-Ju ; Kim, Ho-Eui ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2045~2049
In this paper, we propose an novel architecture for H.264 High Profile Encoder Intra Prediction module. This designed module can be operated in 306 cycle for one-macroblock. To verify the Encoder architecture, we developed the reference C from JM 13.2 and verified the our developed hardware using test vector generated by reference C. We adopt plan removal and SAD calculation to reduce the Hardware cost and cycle. The designed circuit can be operated in 133MHz clock system, and has 250K gate counts using TSMC 0.18 um process including SRAM memory.
Realization for Moving Object Sensing and Path Tracking System using Stereo Line CCDs
Ryu, Kwang-Ryol ; Kim, Young-Bin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2050~2056
A realization for moving object sensing and tracking system in two dimensional plane using stereo line CCDs and lighting source is presented in this paper. The system is realized that instead of processing camera images directly, two line CCD sensor and input line image is used to measure two dimensional distance by comparing the brightness on line CCDs. The algorithms are used the moving object sensing, path tracking and coordinate converting method. To ensure the effective detection of moving path, a detection algorithm to evaluate the reliability of each measured distance is developed. The realized system results are that the performance of moving object recognizing shows 5mm resolution, and enables to track a moving path of object per looms period.
Individual verification method by PPG measurement
Kim, Sheen-Ja ; Lee, Young-Woo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2057~2061
Individual heartbeat has specific character by a condition of heart, structure, age, and so forth. On this paper, We propose that individual verification method using specific character of heartbeat. This character are obtained by measure PPG(Photo Plethysmogram) using LD and PD.
Development of Embedded RFID System for Constructing ITS based on Wibro
Chang, Won-Tae ; Kim, Tae-Yong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2062~2068
In a u-City project in Busan, public transportation which is one of ITS has been considered. RFID system embedded with PXA255 chip and middleware capable of communicating a server side was developed. To perform data communication link with traffic card, developed system consists of wireless modules that are wireless LAN (IEEE802.11a/b and IEEE802.16. Using developed RFID system and middleware, it is expected that this system becomes a basic infrastructure to support a service of u-Traffic for u-City construction.
Design of Electrostatic Monitoring System
Kim, Kang-Chul ; Byon, Chi-Nam ; Lim, Chang-Gyoon ; Han, Seok-Bung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2069~2076
In this paper, we develop an electrostatic monitoring system which is composed of an electrostatic prediction system and a warning message transmission system. The electrostatic prediction system in a factory receives the value of electrostatic charge from the electrostatic sensor and predicts the next value by using past data and sends the value to the warning message transmission system through the bluetooth communication. The warning message transmission system gets a warning signal and transmits the warning message to the worker's cellphone through a commercial SMS web by a socket program running on Windows PC in a control room. We propose electrostatic forecasting algorithms based on LSR(least square regression) using weight factors in an electrostatic prediction system. Simulation results show that the algorithm with dynamically variable weight factors is best with 64.69V standard deviation and a warning message transmitted by the warning message transmission system is displayed on cellphone after about 5 seconds.
3D Reconstruction of Tissue from a few of MRI Images using Radial Basis Function
Shin, Young-Seok ; Kim, Hyoung-Seok B. ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2077~2082
Recent the advanced technologies in medical imaging such as magnetic resonance imaging (MRI) and computed tomography (CT) make doctors improve the diagnostic skill with detailed anatomical information. In general, it is necessary to get a number of MRI images in order to obtain more detail information. However, the performance of MRI machines of privately run hospitals is not good and thus we may obtain only a few of MRI images. If 3D surface reconstruction is accomplished with a few slices, then it generates 3D surface of poor qualify. This paper propose a way to Set a 3D surface of high quality from a few of number of slices. First of all, our algorithm detects the boundary of tissues which we want to reconstruct as a 3D object and find out the set of vortices on the boundary. And then we generate a 3D implicit surface to interpolate the boundary points by using radial basis function. Lastly, we render the 3D implicit surface by using Marching cube algorithms.
Control of Temperature and the Direction of Wind Using Thermal Images and a Fuzzy Control Method
Kim, Kwang-Baek ; Cho, Jae-Hyun ; Woo, Young-Woon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2083~2090
In this paper, we propose a method for control of temperature and the direction of wind in an air-cooler using thermal images and fuzzy inference rules in order to achieve energy saving. In a simulation for controlling temperature, a thermal image is transformed to a color distribution image of
size to analyze the thermal image. A color distribution image is composed of R, G and B values haying temperature values of Red, Magenta, Yellow, Green, Cyan and Blue. Each color has a temperature value from
and a color distribution image is classified into height hierarchies from level 1 to level 10. The classified hierarchies have their peculiar color distributions and temperature values are assigned to each level by temperature values of the peculiar colors. The process for controlling overall balance of temperature and the direction of wind in an indoor space is as follows. Fuzzy membership functions are designed by the direction of wind, duration time, and temperature and height values of a color distribution image to calculate the strength of wind. After then, the strength of wind is calculated by membership values of membership functions.
Mobile Device Description Repository System
Lee, Young-Il ; In, Min-Kyo ; Lee, Kang-Chan ; Lee, Seung-Yun ; Kim, Chang-Su ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2091~2096
Due to the improvement of mobile device capabilities, a demand for various contents service is increasing. But the differences from heterogeneous mobile devices force to develop contents which is dependent on a mobile. To solve this problem, adaptation course that reorganize contents by the device capability is hooded. In this course, device description is described using device description language but there are some problems that is absence of device description repository and the way to get device description data. In this paper, I suggest device description acquisition module and define the interfaces to access device description repository that I designed and implemented.
The research for human bio-signal monitoring smart home system
Kim, Kuk-Se ; Kwon, Young-Sun ; Lee, Ho-Young ; Lee, Joon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2097~2104
Ubiquitous services are high duality and differentiated services which are provided for users by recognizing the context of users and environmental conditions actively. In this case, context-aware middleware is one of the most important technologies required to implement the ubiquitous services. In this paper, we propose a method for providing ubiquitous services in a specific user space effectively and monitoring human bio-signal sensors. That is, the design and implementation of intelligent home service middleware and monitoring human bio-signal sensor based on context awareness is discussed here. Context information from various sensors is gathered, and suitable services are inferred and provided to users by the middleware system. In our approach, user services can be modelled easily by using facts and rules, and the system can be extended easily to support various ubiquitous services other than intelligent home services also. The system can be integrated with external applications and legacy systems effectively by using various protocols such as RMI, socket and HTTP, XML and Zigbee etc. We have designed and evaluated various facts and rules for intelligent home services in real environments. Functionality evaluation with the system shows that ubiquitous services can be provided to users effectively in a home environment.
Principal Component analysis based Ambulatory monitoring of elderly
Sharma, Annapurna ; Lee, Hoon-Jae ; Chung, Wan-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2105~2110
Embedding the compact wearable units to monitor the health status of a person has been analysed as a convenient solution for the home health care. This paper presents a method to detect fall from the other activities of daily living and also to classify those activities. This kind of ambulatory monitoring of the elderly and people with limited mobility can not only provide their general health status but also alarms whenever an emergency such as fall or gait has been occurred and a help is needed. A timely assistance in such a situation can reduce the loss of life. This work shows a detailed analysis of the data received from a chest worn sensor unit embedding a 3-axis accelerometer and depicts which features are important for the classification of human activities. How to arrange and reduce the features to a new feature set so that it can be classified using a simple classifier and also improving the classification resolution. Principal component analysis (PCA) has been used for modifying the feature set and afterwards for reducing the size of the same. Finally a Neural network classifier has been used to analyse the classification accuracies. The accuracy for detection of fall events was found to be 86%. The overall accuracy for the classification of Activities or daily living (ADL) and fall was around 94%.
The Ubiquitous-Dormitory Management System Based on RFID System
Oh, Jeong-Hoon ; Eom, Ki-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2111~2118
This parer propose a U-dormitory management system based on 13.56MHz RFID system. The proposed U-dormitory management system consists of three parts, the RFID hardware system, the middleware, and the application. RFID hardware system uses 13.56MHz frequency which is suitable for a close range. The middleware is implemented to accept the RFID hardware system values using RS-232c communication method and forward the values to the application. The application is designed to make the DB using the forwarded Haloes, and works based on the DB. The efficacy of the Proposed U-dormitory management system is verified by means of experiments. In the experiments, we set up the system to the dormitory of Daeduk College to show the improvement results of proposed system.
A Design of a Personnel Control System Using UHF-RFID in Shipping
Cha, Jin-Man ; Kim, Myeung-Hwan ; Sung, Kil-Young ; Lee, Sang-Wook ; Park, Yeoun-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2119~2124
An information-oriented basis in today's society has been changing fast, and the desire for connectivity has caused an exponential growth in wireless communication and sensor network. Sensor networks using RFID, in particular, have led this trend due to the increasing exchange of data in Ubiquitous such as the home RF, access control system, U-Healthcare, and Logistics information Systems. Also, the RFID when it applies a technique, is able to raise the stability of shipping as controling the mobile course and an entrance and exit of the crews an well as previously preventing an accident from shipping. In this paper, we designed and implemented personnel control system using UHF-RFID in vessels which shows through host PC reading and writing tag.
Development of Robot Based Curriculum for an University Education
Lho, Young-Uhg ; Jung, Deok-Gil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 12, issue 11, 2008, Pages 2125~2130
In the knowledge and information age, it is necessary that a talent person have the thinking and exploring power, the problem solving ability and creativity. Bring up the students to be the talent persons determine the future of a country and a society. In this paper, we proposed the Robot based curriculum for an university education. We instructed the university students the curriculum. And we examined on the questions to the student, analyzed the results and proposed the improvement.