Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 13, Issue 12 - Dec 2009
Volume 13, Issue 11 - Nov 2009
Volume 13, Issue 10 - Oct 2009
Volume 13, Issue 9 - Sep 2009
Volume 13, Issue 8 - Aug 2009
Volume 13, Issue 7 - Jul 2009
Volume 13, Issue 6 - Jun 2009
Volume 13, Issue 5 - May 2009
Volume 13, Issue 4 - Apr 2009
Volume 13, Issue 3 - Mar 2009
Volume 13, Issue 2 - Feb 2009
Volume 13, Issue 1 - Jan 2009
Selecting the target year
Web site Evaluation of Culture and Tourism using AHP method
Kim, Min-Cheol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1737~1744
This study calculated the relative importance between evaluation factors of websites focused on culture and tourism in J region by 3C_D_T evaluation model of website. That is, this paper was analyzed by AHP (analytic hierarchy process) and calculated the relative weights and preference. In conclusion, this study showed that content was the most important factor and proposed the improvement planning through sensitivity analysis.
Minimizing Design of the Schiffman Phase Shifter Using the Defected Ground Structure
Kim, Gi-Rae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1745~1752
This Paper represents a new method, which uses defected ground structure (DGS) on the ground planes of microstrip lines, to reduce the size of the Schiffman phase shifter. DGS on the microstrip line shows an increased slow-wave effect due to the additional equivalent L and C components. So the electrical length of transmission line with DGS is longer than that of standard transmission line for the same physical length. Then, the length of transmission line with DGS can be shortened in order to maintain the original electrical length to be same. The performances of reduced phase shifter with DGS are quite similar to the ones of original Schiffman phase shifters. We can reduce the size about 15% using the DGS in original Schiffman phase shifter.
A Study on the Estimation of Wind Velocity in Asymmetric Doppler Spectra of Weather Signals
Lee, Jong-Gil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1753~1759
A weather radar as one of the remote sensing devices to analyze the weather phenomena receives the return echoes which consist of scattered electromagnetic wave signals from rain, cloud and dust particles, etc. These received Doppler weather spectra are analyzed to extract the various characteristic weather information. The mean wind velocity is one of the important weather parameters which can be obtained by a weather radar ed it may be useful in the prevention of weather hazards occurred by the abrupt shift of wind in small geographical scales such as microbursts. It is usually estimated by pulse pair method which is considered to be reliable and very efficient in the computational requirement. However, there are some problems in the accurate estimation of the mean velocity if Doppler spectra of weather signals appear to be asymmetric gaussian or multi-peak spectra. Therefore, in this paper, the problems in the mean estimation of asymmetric Doppler spectra are analyzed and the improved method is suggested.
Broadcast Program Distribution System of PKI Certificate-based
Park, Ki-Chul ; Lee, Joo-Young ; Nam, Je-Ho ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1760~1766
Digital broadcasting and digital CATV and IPTV will continue in the competition, regardless of how the content of the program was broadcast over the Internet distribution and the damage of piracy is also growing. Excellent quality of the content of the digital CATV sales of DVD and high-density storage media because there is no difference in content and quality is the problem of illegal distribution. However, users can record and reuse program in the position of the guaranteed rights, and the purpose of training in fair and illegal recording and distribution needs to be separate from it. In this paper using a digital certificate recorded by the user and the process to ensure the purpose of illegal distribution of pharmaceutical distribution system design and implementation of the program was broadcast.
Robust and Secure InIm-based 3D Watermarking Scheme using Cellular Automata Transform
Piao, Yong-Ri ; Kim, Seok-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1767~1778
A robust and secure InIm(Integral imaging)-based 3D watermarking scheme using cellular automata transform (CAI) is proposed. In the InIm-based 3D watermarking scheme, the elemental image array (EIA) watermark for the target watermark which has to be detected, is synthesized from the computational pickup process of InIm and embedded in a cover image. The EIA watermark can provide a robust reconstruction of the target watermark However, the 3D property of the EIA watermark causes a weakening of the security. To overcome this problem, the proposed method uses the CAT domain to embed and extract the EIA watermark in the cover image. The use of CAT significantly improves the security for our watermarking algorithm using a single secure key only. Experiments are presented to show that the proposed scheme shows robust and secure performances against various attacks.
A Study on the Surveillance Camera System for Privacy Protection
Moon, Hae-Min ; Pan, Sung-Bum ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1779~1786
Due to increased terrors and crimes, the use of surveillance camera systems including CCTV is also increasing. Private information such as faces or behavior patterns can be recorded in CCTV and when it is exposed, it may cause infringement to privacy and crimes. This paper analyses conventional methods on protection of privacy in surveillance camera system and then suggests an RFID-based surveillance camera system that can both watch crimes and protect privacy. The proposed system protects privacy and watches crimes using scrambling and an RFID system.
Tangible Electronics Dice Game interface Development for Family Leisure
Ok, Soo-Yol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1787~1794
In this paper, the author proposes a tangible electronic dice which can be used for IPTV games for familiy meeting in living room and prevents game addiction of young children. The tangible electronic dice was designed to be as similar to traditional dices as possible in order for people to operate the tangible electronic dice with direct and intuitive manipulation. The proposed tangible electronic dice is self-contained so that no external devices are needed. The experiments show that the dice can be effectively applied to games running in PC and IPTV environments. The author will verify the practicality of the dice by applying the dice to IPTV games which are currently being developed.
Motion Based Serious Game Using Spatial Information of Game and Web-cam
Lee, Young-Jae ; Lee, Dae-Ho ; Yi, Sang-Hong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1795~1802
Motion based serious game is a new style of game and exercise using hands, arms, head and whole body. At that time gamer's reachable movement space is an important game space and interaction happening place. We propose efficient game spatial division and analysis algorithm that gives special information for collision avoidance of game objects. We devide into 9 parts of game space and check the enemy position and upper, down, left and right side movement information of gamer and calculate optimal path for collide avoidance of the enemy. To evaluate the method, we implemented a motion base serious game that consists of a web cam, a player, an enemy, and we obtained some valid results of our method for the collision avoidance. The resole demonstrated that the proposed approach is robust. If movement information is in front of enemy, then the enemy waits and finds the place and runs to avoid collision. This algorithm can be used basic development of level control and effective interaction method for motion based serious game
FPGA Implementation of I/Q Imbalance Estimator in OFDM System
Byon, Kun-Sik ; Kim, Jin-Su ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1803~1810
This paper designed IQ imbalance estimator and compensator to cancel the IQ imbalance error in DVB-T system using OFDM by Matlab. Among Matlab model, we designed and implemented IQ imbalance estimator and compensator by System Generator of Xilinx and Matlab model compared with Xilinx System Generator Model for FPGA implementation. As a result of simulation, we confirmed that both model estimated and compensated IQ imbalance error very well. Also, we verified the performance through hardware co-simulation, timing analysis and resource estimation with Xilinx Spartan3 xc3s1000 fg676-4 target Device.
Traffic Flow Control Channels Analysis Using Symmetry Link Network in Wireless Communication
Park, Kwang-Chae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1811~1818
This paper is about the research to maintain and enhance the flow of data of the wireless traffic control. Various types of burst traffic that were found at TCP window flow control have been removed or mitigated using the two-way traffic control. Currently, TCP ACK Compression problem appears during the transmission of the wireless communication control channel because the queues are mostly located at the end system. Therefore, in this paper, the periodic bursty characterist of the source IP queue wilt be analyzed to predict the maximum value of queues. And then the prediction tool will be applied to wireless communication traffic control to handle symmetric traffic as to increase the throughput and improve the performance.
A study on the network coding enabled cooperative MAC protocol at Ad Hoc networks
Jang, Jae-Shin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1819~1828
Until now, much research on cooperative communications to increase system throughput at Ad Hoc networks has been provided. In this paper, in order to enhance system throughput much more at Ad Hoc networks, a network coding-enabled new MAC protocol, called NC-MAC protocol, is proposed and its performance is evaluated with a mathematical approach. Numerical results show that this scheme provides conspicuously enhanced system throughput compared to DCF scheme, and more increased system throughput by 48% than rDCF and CO-MAC schemes.
Routing Mechanism for Data Transmission QoS in Mobile Ad-hoc Network
Cha, Hyun-Jong ; Yang, Ho-Kyung ; Shin, Hyo-Young ; Jo, Yong-Gun ; Ryou, Hwang-Bin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1829~1836
A wireless Ad-hoc network is willing to send and receive data and for other nodes, and it is a temporal network where the nodes with mobility are automatically constituted. This network has been studied to construct networks in the state where there is no infrastructure. The limited nodes and its frequent moving in a wireless Ad-hoc network have resulted in frequent network disconnection. Therefore, the data transmission rate should be secured in a wireless Ad-hoc network. This study proposes the method to improve QoS of data transmission considering the mobility of nodes that respond to path searching by means of AOMDV routing protocol. By applying the suggested method, it is possible to raise the transmission rate by improving the reliability of transmission path.
Implementation of Ternary Valued Adder and Multiplier Using Current Mode CMOS
Seong, Hyeon-Kyeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1837~1844
In this paper, the circuit of 2 variable ternary adder and multiplier circuit using current mode CMOS are implemented. The presented ternary adder circuit and multiplier circuit using current mode CMOS are driven the voltage levels. We show the characteristics of operation for these circuits simulated by HSpice. These circuits are simulated under
CMOS standard technology,
unit current in
ratio of NMOS length and width, and
ratio of PMOS length and width, and 2.5V VDD voltage, MOS model Level 47 using HSpice. The simulation results show the satisfying current characteristics. The simulation results of current mode ternary adder circuit and multiplier circuit show the propagation delay time
, operating speed 300KHz, and consumer power 1.08mW.
Development of a Web Based Diligence and Indolence Management System
Cho, Sung-Mok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1845~1850
Generally, small and medium scale enterprises have conventionally been performing diligence and indolence management by hand, but many of them have been recently costing a lot of money for their diligence and indolence management and security maintenance. But yet, they have annoying sides due to the initial stage cost for the introduction of the system which is consisted of a terminal for reading a card, an RFID card, an administrative sewer and an application program for the diligence and indolence management as well as the insufficiency of the fixing skill being able to cope with the problems originating from hardware and software troubles. For this reasons, we developed a new diligence and indolence management system that the initial stage cost is moderate because it is needless to purchase a new server and to issue a new card, and the operation and management of the system is convenient because an RFID card reader communicates with a central administrative server in IDC(Internet Data Center) over internet for the diligence and indolence management.
A Study of FPGA Modul Algorithm consider the Power Consumption for Digital Technology
Youn, Choong-Mo ; Kim, Jae-Jin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1851~1857
In this paper, reuse module generation algorithm consider the power consumption for FPGA technology mapping is proposed. To proposed algorithm is RT library generating algorithm consider power consumption for reuse module using FPGA technology mapping. In the first, selected FPGA for power consumption calculation. Technology mapping process have minimum total power consumption consider LUT's constraint in selected FPGA. A circuit into device by selected proper modules of allocation result for power consumption constraint using data.
Design of Low-Area 1-kb PMOS Antifuse-Type OTP IP
Lee, Cheon-Hyo ; Jang, Ji-Hye ; Kang, Min-Cheol ; Lee, Byung-June ; Ha, Pan-Bong ; Kim, Young-Hee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1858~1864
In this paper, we design a non-volatile memory IP, 1-kb one-time programmable (OTP) memory, used for power management ICs. Since a conventional OTP cell uses an isolated NMOS transistor as an antifuse, there is an advantage of it big cell size with the BCD process. We use, therefore, a PMOS transistor as an antifuse in lieu of the isolated NMOS transistor and minimize the cell size by optimizing the size of a OTP cell transistor. And we add an ESD protection circuit to the OTP core circuit to prevent an arbitrary cell from being programmed by a high voltage between the terminals of the PMOS antifuse when the ESD test is done. Furthermore, we propose a method of turning on a PMOS pull-up transistor of high impedance to eliminate a gate coupling noise in reading a non-programmed cell. The layout size of the designed 1-kb PMOS-type antifuse OTP IP with Dongbu's
Design of The Environment for a Realtime Data Integration based on TMDR
Jung, Kye-Dong ; Hwang, Chi-Gon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1865~1872
This study suggests a method for extending XMDR to integrate and search legacy system. This extension blends MSO(Meta Semantic Ontology) for the management of metadata, ML(Meta Location) for the management of location information, and Topic Map which is the standard language used to represent semantic web. This study refers to it as TMDR(Topic Map MetaData Registry). As an intelligent layer, Topic Map functions like an index. However, if the data frequently changes, the efficiency of Topic Map may drop. To solve this problem, the proposed system represents the relation among metadata, the relation among real data, and the relation between metadata and real data as Topic Map. The represented Topic Map proposes a method to reduce the changing relation among real data caused by the relation among metadata.
Fast Neighbor Discovery for IEEE 802.11s based Mobile Mesh Node
Song, Byeong-Gu ; Kim, Jong-Deok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1873~1882
In the ad-hoc mode of IEEE 802.11 standard, beacon is used for power control and network alarming between each node, and also it is for the synchronization in controlling network as PCF. However beacon is also used to inform the neighbor nodes of itself except for original purpose in the environment of IEEE 802.11s. For this, the existing beacon's transmission mechanism can't perform a function in full. In this paper, we suggest much faster neighbor discovery reducing network congestion caused by beacon through modification of beacon transmission mechanism. And we will show that suggesting algorithm more faster full neighbor discovery than traditional neighbor discovery using for IEEE 802.11 through simulation and test in real ad-hoc network.
Prioritized Channel Contention Access Method for TDMA based MAC Protocol in Wireless Mesh Network
Yun, Sang-Man ; Lee, Soon-Sik ; Lee, Sang-Wook ; Jeon, Seong-Geun ; Lee, Woo-Jae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1883~1890
Existing MAC protocol can not show good performance in WMN environment. New MAC protocols is proposed because of Mobile Point's mobility, entire distributed environment, heavy traffic problems. This thesis proposes new channel contention method fur Mesh DCF. Mesh DCF uses ACH phase in TDMA frame to perform selection and elimination. Prioritized phases's count m and Fair Elimination phases's count n is determine contention level and make string probability to only one win the contention. Contention Number group's count K to determine the contention level in Fair Elimination Phase gives Fairness but make low probability to only one win the contention. It is sure that enough size of n and K can improve entire performance as result.
Performance Comparison of Spectrum Sensing according to Structure of Sensing Receiver
Kang, Bub-Joo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1891~1897
This paper describes the optimization of the spectrum sensing in terms of the throughput of the cognitive radio (CR)system. The conventional rapers do not describe the optimization problem of the spectrum sensing by considering the channel search and channel move of the CR system to be caused by the appearance of the incumbent user. However this paper evaluates the throughput of the CR user by considering the situations such as the channel search and channel move additionally. Also, this paper suggests the sensing structure being separated the data receiver from sensing receiver, and compares the sensing performance for the same receiver structure of sensing and communication with that for the separated sensing receiver in terms of the throughput of the CR user. The numerical result demonstrates that the performance of the throughput efficiency is improved by the proposed sensing receiver to be separated from the data communication path.
Phase-based Model Using Web Documents for Korean Unknown Word Recognition
Park, So-Young ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1898~1904
Recently, real documents such as newspapers as well as blogs include newly coined words such as "Wikipedia". However, most previous information processing technologies cannot deal with these newly coined words because they construct their dictionaries based on materials acquired during system development. In this paper, we propose a model to automatically recognize Korean unknown words excluded from the previously constructed dictionary. The proposed model consists of an unknown noun recognition phase based on full text analysis, an unknown verb recognition phase based on web document frequency, and an unknown noun recognition phase based on web document frequency. The proposed model can recognize accurately the unknown words occurred once and again in a document by the full text analysis. Also, the proposed model can recognize broadly the unknown words occurred once in the document by using web documents. Besides, the proposed model fan recognize both a Korean unknown verb, which syllables can be changed from its base form by inflection, and a Korean unknown noun, which syllables are not changed in any eojeol. Experimental results shows that the proposed model improves precision 1.01% and recall 8.50% as compared with a previous model.
Enhanced FCM-based Hybrid Network for Pattern Classification
Kim, Kwang-Baek ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1905~1912
Clustering results based on the FCM algorithm sometimes produces undesirable clustering result through data distribution in the clustered space because data is classified by comparison with membership degree which is calculated by the Euclidean distance between input vectors and clusters. Symmetrical measurement of clusters and fuzzy theory are applied to the classification to tackle this problem. The enhanced FCM algorithm has a low impact with the variation of changing distance about each cluster, middle of cluster and cluster formation. Improved hybrid network of applying FCM algorithm is proposed to classify patterns effectively. The proposed enhanced FCM algorithm is applied to the learning structure between input and middle layers, and normalized delta learning rule is applied in learning stage between middle and output layers in the hybrid network. The proposed algorithms compared with FCM-based RBF network using Max_Min neural network, FMC-based RBF network and HCM-based RBF network to evaluate learning and recognition performances in the two-dimensional coordinated data.
An accurate sun tracking controller with reconstructing facility for fault sensor
Keun, Hyun-Woong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1913~1920
An intelligent accurate sun tracking controller for solar lighting system was developed. This controller can detect the faulty sensor and correct the error signal based on Principle Component Analysis theory. A fuzzy controller was developed to control the tracker by using the collected sensor signal for precise position control. Also a multiple range searching sensor module for sun tracking was designed. To show the validity of the developed system, some experiments in the field were illustrated.
Implementation of a Point-to-Multipoint Wireless Communication System Based on The Bluetooth
Bae, Jin-Seop ; Kang, Seog-Geun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1921~1927
In this paper, a point-to-multipoint wireless communication system based on Bluetooth specifications, which is possibly applied to very large vessels, is implemented and analyzed. Here, a communication network is composed of a slave Bluetooth module connected to the task computer and multiple master Bluetooth modules equipped with a sensor. And exploiting the point-to-multipoint data communication among the Bluetooth modules, a surveillance system that recognizes and controls a variety of emergency situations happened on a large vessel is implemented. It is, therefore, considered that the wireless communication system implemented in this paper is possibly exploited a basic technology for the digital shipbuilding of the next generation.
A Power Management Scheme for Sensors with MCU in Sleep Mode in Nano-Q+
So, Sun-Sup ; Choi, Bok-Dong ; Eun, Seong-Bae ; Kim, Byung-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1928~1934
This paper proposes a power management scheme for sensor nodes in wireless sensor networks based on sensor node operating system supporting the sensor transparency, which can turn off the sensors when the MCU is in sleep mode. We classify the sensors in two types, that is, event sensors and polling sensors, to be able to decide whether the sensor is a type of sensors whose power supply can be turned off or not, and we design a new scheduler to support recognition of those different types of sensors. Implementing and evaluation of the scheduler and the power manager supporting sensor transparency are shown based on Nano-Q+.
Lode Location Management Using RSSI Regression Analysis in Wireless Sensor Network
Yang, Hyun-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1935~1940
One of the key technical challenges of wireless sensor network (WSN) is location management of sensor nodes. Typical node location management methods use GPS, ultrasonic sensors or RSSI. In this paper we propose a new location management method which adopts regression analysis of RSSI measurement to improve the accuracy of sensor node position estimation. We also evaluated the performance of proposed method by comparing the experimental results with existing scheme. According to the results, our proposed method, LM-RAR, shows better accuracy than existing location management scheme using RSSI and Friis' equation.
Analysis of Packet Transmission Performance for Construction of Wireless Sensor Networks in Indoor Environment
Lee, Joa-Hyoung ; Jung, In-Bum ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1941~1946
Wireless sensor networks do the monitoring and collecting information in the environment instead of human. Sensor networks are consisted of small sensor nodes with very limited hardware resource and very low network bandwidth. The wireless communication environment causes lots of communication errors so that the sensor network requires error correction technique to increase the reliability of network. The performance of error correction technique could be increased by the researches about the error pattern of CRC. In the paper, we did the performance evaluation - transmission interval, distance between sensor nodes, racket size, and RF power - that affects to the success ratio of data transmission in the indoor environment. we propose the performance metrics of system configuration based on the analysis of performance evaluation.
Service Discovery Mechanism based on Trustable DHT in MANET
Han, In-Sung ; Ryou, Hwang-Bin ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1947~1954
Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.
On Suppressing the Occurrence of Redundant Sensing-Reporting Packets in Assets Monitoring Networks
Tscha, Yeong-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1955~1963
In the application of wireless sensor networks to monitor valuable assets under concern, the appearance of a certain asset can be identified and reported simultaneously by several adjacent nodes, and this may dissipate the power of related nodes and network bandwidth as well. In the proposed method, a node that senses the appearance of some asset is allowed to send the sensing-reporting packet only after it has been being idle for a certain period without receiving any DRP(Don't Report Packet) from neighbors. It turns out that not only the cost of propagating DRPs but also that of reporting the events to the sink becomes minimal when depth of each DRP propagation is 2. In case of depth 1, at least, two routes are set up for the delivery of the sensing-reporting packet hence, reliable transfer to the sink is provided.
Construction of Distributed Web Development Environment using 4-Legged Robot and MSRS
Yang, Tae-Kyu ; Seo, Yong-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1964~1972
This paper proposed a distributed web environment for developing robot services using a 4-legged robot and MSRS. The proposed development environment of the robot services enabled a high-level complicated robot application to operate in a distributed web environment by implementing robot functions as services which can be run on network nodes using Microsoft MSRS. The environment has been also implemented using a 4-legged robot, Genibo as a robot platform. In experiment, we showed the developed robot services are enable to be executed and configured dynamically and support a remote monitoring in a distributed web environment. Finally the feasibility and the effectiveness of the proposed environment has been verified by creating a robot application using the developed robot services in Visual Program Language which helps student to create a complicated robot application system easily.
An Analysis on the Characteristics of the Information Science Gifted Students through Observational Evaluation
Seo, Seong-Won ; Kim, Eui-Jeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 13, issue 9, 2009, Pages 1973~1979
This dissertation was aimed at finding an implication of selecting and educating the gifted of information science discovering features of gifted learner in the field of math and science and the gifted of information science through comparative analysis of observing evaluation for the gifted of information science. Subjects of the study are foundation course learners of University Science Education Institute for the Gifted in the field of physics, earth science, math, information science. We have compared the features of learners of each field through one-way ANOVA about an observing evaluation for one year. In consequence, information science learners showed mostly different features from physics and earth science learners in details of an attitude area and a problem solving area. And an analysis of each subject of information science learners showed that the test of attitude area in the fields of math and information was relatively superior to that of science. On this, the researcher concluded that there must be features of the gifted on information science and their difference from gifted learners in math and science was caused by learner levels and features of each field. Based on the result of this study, we expect that we can imply it to selecting and educating the gifted of information science.