Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 13, Issue 12 - Dec 2009
Volume 13, Issue 11 - Nov 2009
Volume 13, Issue 10 - Oct 2009
Volume 13, Issue 9 - Sep 2009
Volume 13, Issue 8 - Aug 2009
Volume 13, Issue 7 - Jul 2009
Volume 13, Issue 6 - Jun 2009
Volume 13, Issue 5 - May 2009
Volume 13, Issue 4 - Apr 2009
Volume 13, Issue 3 - Mar 2009
Volume 13, Issue 2 - Feb 2009
Volume 13, Issue 1 - Jan 2009
Selecting the target year
The Effects on Social Welfare and Regulation of Bundling in Telecommunications Service
Jung, Choong-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 207~214
This paper provides the analysis of economic theories about bundling in telecommunications service. First, the negative aspect of bundling is discussed. Second, the competitively neutral aspect of bundling which is counter response of negative effect is analyzed. Third, some variables affecting the bundling is investigated and the corresponding effect of bundling is discussed. The bundling can increase the social welfare under some circumstance while it sometimes decreases economic efficiency by detering the entry of competitive firms. Finally, regulatory approaches on bundling such as the criteria of bundling provision, the requirement of equal access, the discounting scheme ad a price control, ex anti regulation vs. ex post regulation, and the criteria of predatory pricing are provided.
Analysis of Interference Effects Caused by LR-WPAN in the Frequency Band of 900MHz
Kang, Sang-Gee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 215~220
LR-WPAN(Low-Rate Wireless Personal Area Network) hewn as IEEE 802.15.4 is considered as one of the most suitable specifications published until now to accomplish USN(Ubiquitous Sensor Network). In this paper we simulate interference effects to other systems if LR-WPAN will be used in 900MHz. In considering the current usage situation of 900MHz frequency band, we can think LR-WPAN shares the frequency band of
assigned for RFID/USN. The simulation results of the case of LR-WPAN and RFID/USN sharing the frequency band show that the probability of interference of LR-WPAN to CT1 and RFID is 2.5% and 2.1%, respectively. In order to avoid interference effects to public communications, simulations results show that the protection distance of about loom is needed.
A Study on the Factors to Influence Permittivity in the Radome Manufacturing Process
Kang, Shin-Min ; Keum, Jong-Ju ; Kang, Chun-Ho ; Lee, Seung-Jae ; Byun, Gi-Sig ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 221~226
A nonlinear curve shaped radome should be designed in a way that the deterioration of electrical performance in terms of mechanical strength and radio frequency(RF) can be minimized to protect the antenna. Electrical performance, in particular, is a critical factor that depends on the permittivity of the original materials and thus should be monitored during the manufacturing process along with other factors. This study set out to identify major factors that would affect permittivity during the manufacturing process of a radome through experiments and examine the impacts of permittivity on a radome's electrical performance through simulations.
Analysis of PSK modulation signal generation circuit using hybrid coupler and delay line
Ban, Kyung-Sig ; Kim, Young-Wan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 227~232
The simple PSK signal generation method using a quadrature hybrid coupler and reflection coefficient elements was analyzed in this paper. The PSK modulation signal with a constant constellation is generated by reflection coefficient from 90o hybrid coupler output ports, the high-mode PSK signal is also generated by the hybrid structure of coupler, delay line and power combiner. The BPSK signal is simply generated by a 90o hybrid coupler and reflection elements, and QPSK with 90o phase constellation is generated by additional delay line and power combiner. By simulation results, the generated PSK signals by the proposed circuit get good modulation spectra within 3o phase error.
The Problems in Digital Watermarking into Intra-Frames of H.264/AVC
Choi, Hyun-Jun ; Seo, Young-Ho ; Kim, Dong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 233~242
This paper intend to show the affect of the intra-prediction on the typical digital watermarking method and the fact that the watermarking method has very low effectiveness when it is performed for the intra-frames of H.264. The target watermarking method was the one for imperceptibility and robustness and was assumed to be performed during the intra-compression process by the H.264 technique. Also this method was assumed to insert watermark data and to extract it for certification if needed. The problem is that the resulting data from the re-engineering of the watermark insertion process to extract the watermark data is different from the one before. We experimentally showed that it stems from the intra-prediction itself. That is, we showed that the resulting image data from only compression without watermarking changes if it is re-compressed by the same conditions as the first compression and it is because the intra-prediction modes as well as the coefficient values change. Also, we applied one blind and one semi-blind watermarking methods to show that the typical attacks after watermarking makes this problem much more serious and lowers the effectiveness of the watermarking method dramatically. Therefore we concluded by considering the experimental data that a typical watermarking method which has been researched so far cannot guarantee the effectiveness of intra-frame watermarking and it is highly required to developed a new kind of methodologies.
An Implementation of Writing Tool for Use Case Description
Choi, Hwan-Bok ; Kim, Yun-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 243~252
This paper presents an implementing of Use Case Description writing tool to support systematically writing and editing Use Case Description. It also supports both 1 column and 2 column formats of use case scenarios and increases convenience for editing scenario steps with automated step numbering function we presented. It results in not only user-friendly and effective description for use case but also contributing to development of integrated use case modeling tool with use case diagram.
Performance Analysis for TR-UWB System Exploiting Complex Frequency-Components
Jang, Dong-Heon ; Yang, Hoon-Gee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 253~260
This paper, mathematically analyzes the performance of newly proposed TR-UWB system which the frequency components of a UWB pulse were processed so that the system could be implemented with ADCs of a few MHz sampling rate, and presents the comparison with an existing frequency-domain based TR-UWB system. The comparison is mainly based on the SNR ratio which depends on the mean and the variance of the frequency components. We also shows that the simulation results to support the theoretical analysis where the comparison is made under the IEEE 802.15.3a channel model as well as AWGN channel.
Effective Performance Evaluation of IEEE 802.11 WLAN DCF Under Normal Conditions
Lee, Kye-Sang ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 261~266
We analyze the performances of the DCF, which is the medium access control protocol of IEEE 802.11 WLAN, assuming normal traffic condition. There have been much less research efforts under the normal condition than those under the saturated one. This paper proposes an analytical method of approximating the transmission attempt rate under normal condition as proportional to that under saturated condition. In result, we show that we can obtain the transmission attempt rate and the packet collision probability which quickly converge using iterative computations of relatively simple equations, and using these results we derive the network throughput and medium access delay. Numerical results show that our method is much less complex than those based on the Markov Chain while it can predict the performances quite accurately.
Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices
Yeoh, Chee-Min ; Lim, Hyo-Taek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 267~276
Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.
Seamless handover protocol to reduce handover latency
Jang, Jong-Min ; Lee, Yu-Tae ; Lee, Soong-Hee ; Kim, Dong-Il ; Choi, Sam-Gil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 277~284
With significant development in wireless communication technologies, the needs to handover from one network to another have grown dramatically. Recently IETF developed MIPv6 and FMIPv6 which are used to handover between different access networks. These handover mechanisms have some known weaknesses. MIPv6 can not serve time-critical application because it causes long handover latency and packet loss. By these reasons, MIPv6 does not guarantee session continuity. FMIPv6 uses handover preparation phase to reduce DAD latency. However FMIPv66 still suffers from long handover latency, because it must perform binding update at the end of handover procedure. In this paper we propose new handover mechanism FMIPv6-PBU which eliminates binding update latency. The proposed mechanism has compatability with lagacy FMIPv6. In this paper propose FMIPv6-PBU handover procedure and explain its procedures and evaluate it with MIPv6 and FMIPv6.
Analysis of the Lee-Chen's One-Time Password Authentication Scheme
You, Il-Sun ; Kim, Bo-Nam ; Kim, Heung-Jun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 285~292
In 2005, Lee and Chen suggested an enhanced one-time password authentication scheme which can prevent the stolen verifier attack that the Yeh-Shen-Whang's scheme has. The Lee-Chen's scheme addresses the stolen verifier attack by deriving each user's pre-shared secret SEED from the server secret. However, we investigated the weakness of the Lee-Chen's scheme and found out that it was suffering from the off-line dictionary attack on the server secret. We demonstrated that the off-line dictionary attack on the server secret can be easily tackled with only the help of the Hardware Security Modules (HSM). Moreover, we improved the scheme not to be weak to the denial of service attack and allow compromise of the past session keys even though the current password is stolen. Through the comparison between the Lee-Chen's scheme and the proposed one, we showed that the proposed one is stronger than other.
Design of a High-Performance Information Security System-On-a-Chip using Software/Hardware Optimized Elliptic Curve Finite Field Computational Algorithms
Moon, San-Gook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 293~298
In this contribution, a 193-bit elliptic curve cryptography coprocessor was implemented on an FPGA board. Optimized algorithms and numerical expressions which had been verified through C program simulation, should be analyzed again with HDL (hardware description language) such as Verilog, so that the verified ones could be modified to be applied directly to hardware implementation. The reason is that the characteristics of C programming language design is intrinsically different from the hardware design structure. The hardware IP which was double-checked in view of hardware structure together with algoritunic verification, was implemented on the Altera CycloneII FPGA device equipped with ARM9 microprocessor core, to a real chip prototype, using Altera embedded system development tool kit. The implemented finite field calculation IPs can be used as library modules as Elliptic Curve Cryptography finite field operations which has more than 193 bit key length.
Collision Attack on Cellular Automata based Hash Function Applicable to Authentication on Online Game
Lee, Chang-Hoon ; Lee, Je-Sang ; Cho, Sung-Eon ; Kim, Tai-Hoon ; Kim, Soo-Kyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 299~308
In this paper, we. present a collision attack on hash function with 2-dimensional cellular automata, which is useful for providing authentication on online game. This attack can find a collision message pair with
computation using property of nonlinear function. We also extend basic attack with probability
to improve attack with probability 1 using Wang's analysis technique.
An Onboard Printer Server Based on Embedded Linux
Cha, Kyung-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 309~314
PC users could experience some inconvenience when they use their PC that was physically connected to network printers shared by other People in the network due to the overload. This paper shows how to resolve this kind of overload problem and established the embedded printer system based on embedded Linux system which performs the printer server in order for any users in the of ice to do printing work more smoothly via current network. It's own capabilities and functions were verified throughout the various tests in practical environment.
A group based management method of flash memory for enhancing wear-leveling
Jang, Si-Woong ; Kim, Young-Ju ; Yu, Yun-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 315~320
Since flash memory can not be overwritten on updating data, new data are updated in new area and old data should be invalidated and erased for garbage collection. With develop of flash memory technology, capacity of flash memory is rapidly increasing. It increases rapidly execution time of CPU to search an entire flash memory of large capacity when choosing the block to erase in garbage collection. To solve the problem that is increasing execution time of CPU, flash memory is partitioned into several groups, the block to erase in garbage collection is searched within the corresponding group. In workload of access locality, we enhanced wear-leveling within group by allocating hot data to hot group and cold data to cold group respectively and enhanced wear-leveling among groups by exchanging periodically hot group and cold group.
A Study on Metadata-based Data Quality Management in a Container Terminal
Kang, Yang-Suk ; Choi, Hyung-Rim ; Kim, Hyun-Soo ; Hong, Soon-Goo ; Jung, Jae-Un ; Park, Jae-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 321~329
Due to the massive increase of data that should be managed, the problems in data quality management have been issued. In addition the lack of integrated management of the data causes duplication of data, low qualify services, and, missing data. To overcome these problems, this study attempts to examine the way of the data qualify management. To do this, metadata was defined, and its current management status in various view points was analyzed, and finally the metadata management was applied to the container terminal. for the "A" container terminal, we performed data standardization, and reflected major constraints and developed the pilot metadata repository. The contributions of this study are in improvement of the data qualify in the container terminal, and its practical application with metadata management method. Limitations of this study is its partial implementation of the metadata management to the company and interoperability of the metadata management for business to business data integration for the future research.
Multi-body Dynamics and Position Control Simulation for 2-Axes Gimbals in Naval Shipboard
Yun, Chan-Shik ; Ku, Ki-Young ; Kim, Sang-Ik ; Jeon, Hee-Ho ; Lee, Seung-Joon ; Byun, Gi-Sig ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 330~340
A naval shipboard inevitably movies in a pitch and roll direction under the influence of wave and wind in the sea. As a result, the shipboard gets in a continuous turning motion back/front and right/left. And the shipboard is also constantly exposed to many different kinds of disturbance signals including the vibrations of various frequencies from the internal equipments and their vibrations, strong waves, and impact from explosion. This paper formulates multi-body dynamic models similar to an actual system and simulates the pitch/roll positions of a 2-axes gimbals with PI controller for consecutive behavior of a naval shipboard including disturbance.
The performance evaluation of the polymer arm insulator for a compact transmission line tower
Song, Hong-Jun ; Park, Gi-Ho ; Kim, Gwan-Hyung ; Byun, Gi-Sik ; Hwang, Yeong-Yeun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 341~347
As a right-of-way security for the high power transmission line tower construction is becoming more and more difficult, the friendly environmental compact tower design is required. For a proper insulation for the compact tower, the polymer material are being tried. Some countries has already adapted, in the various polymer application and management data, polymer arm insulator to the transmission tower, and shown a stable operation. However, in our country, the polymer arm insulator has left much to be desired in the installation on the transmission line tower. But polymer material has been developed by high strength and technology and is expected to be used in various electric equipments. The polymer arm insulator is a one of good electric insulation materials to expand the power supply capacity in the rapid power demand increasement In this research, the new polymer am insulator is designed and its electric specifications are analyzed. Its mechanical specifications is verified through the field test on the compact tower which is modified by the polymer arm insulator.
The Characteristics Analysis of GIDL current due to the NBTI stress in High Speed p-MOSFET
Song, Jae-Ryul ; Lee, Jong-Hyung ; Han, Dae-Hyun ; Lee, Yong-Jae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 348~354
It has analyzed that the device degradation by NBTI (Negative Bias Temperature Instability) stress induced the increase of gate-induced-drain-leakage(GIDL) current for p-MOSFETs. It is shown that the degradation magnitude, as well as its time, temperature, and field dependence, is govern by interface traps density at the silicon/oxide interface. from the relation between the variation of threshold voltage and subthreshold slope, it has been found that the dominant mechanism for device degradation is the interface state generation. From the GIDL measurement results, we confined that the EHP generation in interface state due to NBTI stress led to the increase of GIDL current. Therefore, one should take care of the increased GIDL current after NBTI stress in the ultra-thin gate oxide device. Also, the simultaneous consideration of reliability characteristics and dc device performance is highly necessary in the stress engineering of nanoscale CMOSFETs.
Adaptive Basic Unit Level Rate Control for H.264
Park, Sang-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 355~361
This paper proposes a new basic unit level rate control algorithm which generates the output bits corresponding to the target bits. The H.264 standard uses various coding modes and optimization methods to improve the compression performance, which makes it difficult to control the generated traffic accurately. In the proposed scheme, the allocated bits to a frame are distributed to all basic units properly to encode each basic unit according to the bit budget. After encoding the frame, the encoding parameters are adjusted according to the difference between the target and the resulting values. It is shown by experimental results that the new algorithm can generate output bit rates accurately corresponding to the target bit rates with the PSNR performance better than that of the existing rate control algorithm.
The performance analysis of SA fitters for images corrupted by biased noise
Song, Jong-Kwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 362~368
The SA filters encompass a large class of filters based on order statistics as well as linear FIR filters. The class of SA filters is defined as a multi-stage filters whose output is linear combination of nonlinear(minimum, maximum, exclusive-OR) sub-filter outputs. According to the lust stage nonlinear sub-filters, SA filters are called SAMAX, SAMIN, and SAXOR filters. In this paper, optimal SAMAX and SAMED filters are designed for images corrupted by biased noise. The performance analysis of this experiment shows that SAMAX filters outperforms SAMED filters for biased noise. In the case of un-biased noise, the SAMAX and SAMED filters give the same performance. This result leads us to a new guideline in the application of SA filters.
2D-3D convertible display system having a background of full-parallax integral images
Hong, Suk-Pyo ; Shin, Dong-Hak ; Kim, Eun-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 369~375
In this paper, we propose a 2D-3D convertible display system having a background of full-parallax integral images. The proposed system is composed of integral imaging system and conventional 2D flat display and is able to operate either 3D mode or 2D mode. In 3D mode, the 3D image is generated by combining the 2D main image with the background image based on integral imaging. In 2D mode, the integral imaging system plays a role as the back-light of 2D flat display and then 2D image is observed through 2D flat display. To show the usefulness of the proposed system, we carry out the preliminary experiments and present the successful experimental results.
A Study on Modified Median Filter for Impulse Noise Removal
Lee, Kyung-Hyo ; Kim, Nam-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 376~381
The image data compression, recognition, restoration, etc. are parts of the digital image processing technology. In the process by various devices, noises would be made. Because the noise could damage the image, we use the image filter to preserve the original image from the noise. The image filter used in digital image process basically has a two-dimensional structure. There an two methods of creating the filter - One is reiterating one dimension and the other is using an indivisible two-dimension image filter. The image filter is being widely used along with one-dimension filter according to each noise, and various median filters are being used to remove the impulse noise. In this paper, I suggested a powerful modified median filter, and compared with conventional filters for objective verification.
Security Scheme for Prevent malicious Nodes in WiMAX Environment
Jeong, Yoon-Su ; Kim, Yong-Tae ; Park, Gil-Cheol ; Lee, Sang-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 382~389
As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.
Performance Evaluation of MC-DS-CDMA Systems using STBC Antenna Diversity
Choi, Seung-Kuk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 390~396
MC-DS-CDMA is technique where a single data symbol is transmitted at multiple subcarriers which are orthogonal to each other. With this technique, frequency diversity can be achieved. The performance of PSAM MC-DS-CDMA system with the application of STBC antenna diversity is analyzed. The BER performance of this system over multipath fading environment is evaluated, considering the channel estimation ernr, carrier frequency offset, and the nonlinear high power amplifier.
Symbol Time Tracking Algorithm for WAVE Systems
Hong, Dae-Ki ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 397~406
A Wireless Access for Vehicular Environment (WAVE) system based on Orthogonal frequency Division Multiplexing (OFDM) is made for vehicle to vehicle wireless communications. The physical layer standard of the WAVE system is very similar to that of the IEEE802.1la wireless local area network (WLAN). Therefore, the performance of the WAVE system is degraded by continual timing delay in the WAVE multipath fading channels after starting initial timing synchronization. In this paper, the tracking algorithm that synchronizes symbol timing is proposed to continually compensate additional timing delay. Computer simulation of the proposed algorithm is performed in the worst communication environments that apply to maximum timing delay. Computer simulation shows that the proposed algorithm can improve the system performance in various channel conditions.
A Study on Weld Pattern Analysis and Weld Quality Recognition using Neural Network
Lee, Jun-Hee ; Choi, Sung-Wook ; Shin, Dong-Suk ; Kang, Sung-In ; Kim, Gwan-Hyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 407~412
Recently, in Weld Processing field, unmanned and automatic system construction has experienced the rapid growth, and diverse signal processing has been employed in order to translate the exact weld pattern. In this paper, We will suggest the effective neural network which can decide the weld quality in arc weld and monitoring system in real time. In addition, We will present the pre-processing for selecting the study data, and the method to evaluate the wave of weld more precisely and accurately through known Neural Network.
Speech Signal Compression and Recovery Using Transition Detection and Approximate-Synthesis
Lee, Kwang-Seok ; Lee, Byeong-Ro ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 413~418
In a speech coding system using excitation source of voiced and unvoiced, it would be involved a distortion of speech qualify in case coexist with a voiced and an unvoiced consonants in a frame. So, We proposed TS(Transition Segment) including unvoiced consonant searching and extraction method in order to uncoexistent with a voiced and unvoiced consonants in a frame. This research present a new method of TS approximate-synthesis by using Least Mean Square and frequency band division. As a result, this method obtain a high qualify approximation-synthesis waveforms within TS by using frequency information of 0.547kHz below and 2.813kHz above. The important thing is that the maximum error signal can be made with low distortion approximation-synthesis waveform within TS. This method has the capability of being applied to a new speech coding of Voiced/Silence/TS, speech analysis and speech synthesis.
Basic Research about Building Data of Virtual Reality Space Using forborne LiDAR Data
Choi, Hyun ; Kim, Na-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 419~424
This paper show about the possibility of practical application after building VR(virtual reality) data based on Airborne LiDAR data which determines complicated topography quickly for the 3D-GIS construction. In this paper, we collected Airborne LiDAR data, digital map, serial photo and a basic design. The results are expected some effective determination by 3D-GIS construction based on LiDAR data. Hereafter, because the research will be able to be given quickly topography information on ubiquitous environment the field of construction and GIS will be able to be helped.
A Study on Implementation for Wireless Data Transmission Platform for Medical care using ARM11
Seo, Jae-Gil ; Kim, Young-Kil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 425~430
In medical area, lots of information has been digitized and the desire of personnel health became a matter of primary concern. To satisfy this desire it requires the high-speed handhold Healthcare monitering platform for building U-health system. This paper represents that the implementation of s3c6000 platform with s3c6400 CPU using up-to-date ARM11 technology. This parer also represents building of network system with wireless LAN based on 802.11 in order to transmit medical data. Transmitting and monitoring personnel medical data will be possible in any place with wireless LAN network.
A Design of Home Network Module using RF Module-Chip
Kim, Myeung-Hwan ; Cha, Jin-Man ; Lee, Sang-Wook ; Sung, Kil-Young ; Park, Yeoun-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 431~436
Home network is a rapidly growing area as new technologies are emerging, and new applications are being developed. The progress of home network technologies is growing the home network management technology for control and management of the digital appliances. Embodiment of these home network show marked ich have use for complicated and diversifiable processing. Design of home network system does very important stage through home network comes essential pars. In this paper, We designed and constitute Home network system which designs module using embedded system, STR710F Chip and CC2420 RF Module-Chip with the intention for using RS232C and USB.
The Students's Recognition Analysis and Revitalization Methods of the Open Source Software in the Secondary School
Lho, Young-Uhg ; Lee, Hyo-Jung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 2, 2009, Pages 437~444
There are many activities that open source software may using at several areas from the government and international organization such as the UN. And Korea enforces the open source software demonstration activities with different meaning link. It is an evaluation field whether or not using the open source software in information projects. But the public information and the education against the open source software are insufficient in the secondary school students who are be latent open source software users. In this paper, We present an examination and analysis of the open source software recognition of the secondary school students in Korea. And We suggest education methods that can use the open source software in the information subject of the revised 7th national education curriculum.