Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 14, Issue 12 - Dec 2010
Volume 14, Issue 11 - Nov 2010
Volume 14, Issue 10 - Oct 2010
Volume 14, Issue 9 - Sep 2010
Volume 14, Issue 8 - Aug 2010
Volume 14, Issue 7 - Jul 2010
Volume 14, Issue 6 - Jun 2010
Volume 14, Issue 5 - May 2010
Volume 14, Issue 4 - Apr 2010
Volume 14, Issue 3 - Mar 2010
Volume 14, Issue 2 - Feb 2010
Volume 14, Issue 1 - Jan 2010
Selecting the target year
An implementation of stable transmission and security management system of massive acoustic data in unsecurity and low speed network area
Sun, Doo-Young ; Kim, Duk-Young ; Kim, Yong-Deuk ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1323~1330
DOI : 10.6109/jkiice.2010.14.6.1323
The amount of acoustic data gathered from the acoustic data gathering system is increased dramatically as the acoustic data gathering system become various and highly effective. It is needed to transmit this acoustic data to analysis environment for precise analysis. In this gathering/analysis system, it is also needed the stable transmitting as well as highly perfect security. But the existing system using the conveying method needs a lot of time. In case of using networks, the low speed networking vulnerable in the stable transmitting and the information security is impossible to materialize. In this paper, I would like to propose a transmitting and management system sending a massive gathering acoustic data in the unsecurity and low speed networking environment. The implemented system is to transmit the acoustic data safely in low speed networking environment and secure the acoustic data from various threats.
A Study on Measurement Techniques of EM Wave Absorbing Ability of a RAM for RF Stealth
Choi, Chang-Mook ; Lim, Bong-Taeck ; Ko, Kwang-Soob ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1331~1337
DOI : 10.6109/jkiice.2010.14.6.1331
In this paper, measurement techniques of absorbing ability for a RAM were studied for RCS Reduction needed for materializing ADD`s RF stealth. As for the measurement techniques of absorbing ability, the theories of the free space method, similar to real radar system, and transmission line method, suitable for lab scale, were established. And we made real RAM samples, measured absorbing ability according to each, and compared the results. After comparison, electromagnetic(EM) wave absorbing ability was measured to be somewhat superior in free space method and overall uniform pattern was observed. Therefore, by applying measurement techniques by stage and by frequency we could develop RAM in a more efficient way.
Development of Character Input System using Facial Muscle Signal and Minimum List Keyboard
Kim, Hong-Hyun ; Kim, Eung-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1338~1344
DOI : 10.6109/jkiice.2010.14.6.1338
A person does communication between each other using language. But In the case of disabled person can not communication own idea to use writing and gesture. Therefore, In this paper, we embodied communication system using the facial muscle signals so that disabled person can do communication. Especially, After feature extraction of the EEG included facial muscle, it is converted the facial muscle into control signal, and then select character and communication using a minimum list keyboard.
A Technique for Fixing Size of Reference Signature Data in Structural Signature Verificaiton
Lee, Lee-Sub ; Kim, Seong-Hoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1345~1352
DOI : 10.6109/jkiice.2010.14.6.1345
The structural approach in the signature verification, representing a signature as a structural form of local primitives, shows an excellent performance since it counts in the local characteristics such as local variation, stroke complexity, and etc. However, this method has a problem of template data sizing which can not fix the number of subpatterns comprising a signature. In this paper, we proposed a new algorithm to reduce the signature data into a fixed size by selecting a fixed number of subpatterns which is considered as important parts. As a result, it shows more excellent performance when the fixed sized sub-patterns is applied with local weights extracted from variational characteristics and complexities in local part. And the number of subpatterns representing a signature reference model can be fixed under a certain number of segments determined appropriately.
Detection of Concrete Surface Cracks using Fuzzy Techniques
Kim, Kwang-Baek ; Cho, Jae-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1353~1358
DOI : 10.6109/jkiice.2010.14.6.1353
In this paper, we propose a detection method that automatically detects concrete surface cracks using fuzzy method in the image of concrete surface cracks. First, the proposed method detecting concrete surface cracks detects the candidate crack areas by applying R, G, B channel values of the concrete crack image to fuzzy method. We finally detect cracks by the density information about the detected candidate areas after we remove the detailed noises on the image of the concrete surface cracks. The experiments using real concrete images showed that the proposed method is greatly improved of crack detection compared with the conventional methods.
Programming Accounting Applications using BRMS
Kim, Gi-Hwan ; Park, Jong-Cheol ; Kim, Jae-Hong ; Park, Choong-Shik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1359~1364
DOI : 10.6109/jkiice.2010.14.6.1359
In International Financial Reporting Standards(IFRS), companies have difficulties in managing efficiently own accounting rules and demonstrating the adequacy of accounting processes with the conventional accounting system. BRMS(Business Rule Management System) provides methods for managing, processing, and monitoring these accounting rules according to accounting principles and situation. This paper proposed the BRMS-based financial programming framework for managing and processing the accounting principles and the own accounting rules.
A study on the implementation of digital fisheries information network using PSK31 on MH/HF radio Band
Lee, Dae-Ryung ; Park, Keun-Seong ; Kim, Ki-Mon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1365~1374
DOI : 10.6109/jkiice.2010.14.6.1365
The maritime traffic is more complex these days. It is more hard for the small fishing ships to navigated in shores. The requirements for the navigate information system to protect the sea environments and support the small fishing ships are more increased. However, the Inmarsat communication system is too burden to the fishermen with the expensive terminal and call fees. We propose the wireless digital fishing information network which use the existing MF/HF SSB communications system by connecting I-PHONE, PDA, NetBook, Notebook, PC, etc with the PSK31 method and AIS(Automatic Identification System) on the MF/HF radio Band.
LED visible light communication and their application
Chung, Wan-Young ; Seo, Yong-Su ; Kim, Jong-Jin ; Kwon, Tae-Ha ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1375~1381
DOI : 10.6109/jkiice.2010.14.6.1375
LED(Light Emitting Diode) is an emitting device which energy is same to the bandgap energy of p-type and n-type semiconductor junction. Recently high brightness LED is used in fish-luring light and traffic signal light alternative of normal light bulb, and widely used in the area of display pannel. Moreover nowadays LED has been used as a back light of LCD display. Recently, visible light communication(VLC) using LED, that allow two-way serial data communication between LEDs over a distance of sveral centimeters or meters, has been widely studied in the area of digital information transmission along with illumination and display. In this paper, we present LED communication system and their applications.
Handoff Protocol for Improving Multicast Session Delay In Mobile Networks
Kwon, Sang-Do ; Kim, Kyung-Jun ; Kim, Cheol-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1382~1390
DOI : 10.6109/jkiice.2010.14.6.1382
A multicast session protocol in wireless networks reduces the session delay of multicast delivery caused by moving of mobile host. A hand-off scheme, called MSDR (multicast session delay reduction), in mobile networks is proposed. MSDR protocol that minimizes the delay of a session re-establishment uses the basic unicast routing function of the IETF mobile IP and the DFA (designated foreign agent) to provide multicast services for mobile hosts. Proposed MSDR protocol allows the mobile hosts to continuously receive packets when they move across the basic sets during hand-off. Discrete-event simulation carried out for performance evaluation of MSDR protocol, and simulation results indicated that our scheme can offer a better performance of multicast session delay reduction in terms of signalling cost than that of IETF.
Implementation of an Ultrasonic Modem Providing Low Cost Communication Channel in the Audio Frequency Boundary Band
Jeon, Seong-Bae ; Lee, Dong-Won ; Chung, Hae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1391~1396
DOI : 10.6109/jkiice.2010.14.6.1391
Recently, communication components prefer Bluetooth or Zigbee for PAN. However, using these makes expensive and complicated products such as audio equipments, mobile phones, PC, etc. for transmitting simple messages with low rate. In this paper, we propose wireless communication method using ultrasonic in the audio frequency limit band with speakers and microphones which are in products. We suggest transmitting and receiving methods in the audio frequency limit band for transmitting data without affecting audio signal, and implement an ultrasonic communication modem. Finally, we verify the performance of the ultrasonic communication modem by experiments in an environment with background noise.
Design and Implementation of Channel Allocation Module of Synchronous Area in MOST Network
Jang, Si-Woong ; Kwak, Gil-Bong ; Yu, Yoon-Sik ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1397~1402
DOI : 10.6109/jkiice.2010.14.6.1397
While MOST is an in-vehicle network which transfers concurrently synchronous data, asynchronous data and control data, it provides high bandwidth synchronous section which can transfer video and audio without buffering. To transfer real time data using synchronous section, connections between source node and sink node, and channel allocation for connections are required. In this paper, we proposed synchronous data transfer method and channel allocation method by constructing MOST network after designing and implementing channel allocation module for using synchronous data section.
Keyword Extraction in Korean Using Unsupervised Learning Method
Shin, Seong-Yoon ; Rhee, Yang-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1403~1408
DOI : 10.6109/jkiice.2010.14.6.1403
Korean information retrieval uses noun as index terms or keywords of representing the document. and noun and keyword extraction is to find all nouns presented in the document, In this paper, we proposes the method of keyword extraction using pre-built dictionary. This method reduces the execution time by reducing unnecessary operations. And noun, even large documents without affecting significantly the accuracy, can be extracted. This paper proposed noun extraction method using the appearance characteristics of the noun and keyword extraction method using unsupervised learning techniques.
Digital Watermarking Technique in Wavelet Domain for Protecting Copyright of Contents
Seo, Young-Ho ; Choi, Hyun-Jun ; Kim, Dong-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1409~1415
DOI : 10.6109/jkiice.2010.14.6.1409
In this paper we proposed the watermarking technique using the markspace which is selected by tree-structure between the subbands in the wavelet domain and feature information in the spatial domain. The watermarking candidate region in the wavelet domain is obtained by the markspace selection algorithm divides the highest frequency subband to several segments and calculates theirs energy and the averages value of the total energy of the subband. Also the markspace of the spatial domain is obtained by the boundary information of a image. The final markspace is selected by the markspaces of the wavelet and spatial domain. The watermark is embedded into the selected markspace using the random addresses by LFSR. Finally the watermarking image is generated using the inverse wavelet transform. The proposed watermarking algorithm shows the robustness against the attacks such as JPEG, blurring, sharpening, and gaussian noise.
Design and Implementation of XML Encryption and Digital signature API for Mobile Environment
Cho, Tae-Beom ; Ryu, Hwang ; Park, Jeong-Yong ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1416~1422
DOI : 10.6109/jkiice.2010.14.6.1416
Various other platforms have appeared due to the abolishment of WIPI requirement and increased problems related with hacking and security. Since levels consisting of these platforms are composed of various APIs (Application Programming Interfaces) which are not standardized, other ways must be considered to protect data which are transferred using XML formats. Therefore, XML encryption API and XML digital signature API for data protection and certification, which are both responsible to define mark-up languages for XML encryption and digital signature respectively, were designed in this paper. The simulation system which played the role of the server and client between two terminal units was realized to validate the APIs.
Developing File Security for Windows Operating System
Jang, Seung-Ju ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1423~1428
DOI : 10.6109/jkiice.2010.14.6.1423
This paper designs file security function on Windows O.S. Whenever you use Windows O.S, you need to protect some file data. This paper designs these security protection functions. This paper proposes two security functions on Windows O.S. One is file security. the other is directory access protection. To check the proposed functions well, I experiment the above functions on the Windows O.S. By this experiment, I confirmed that the proposed function worked well.
Design and Implementation of Event Analysis/Arrange Function for Mobile Device Simulator
Lee, Young-Seok ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1429~1434
DOI : 10.6109/jkiice.2010.14.6.1429
Generally, the simulator for mobile device tests automatically an application software after instilling again the event, which is saved in log file according to an event generation sequence, into the application software of device. But, the simulator performance for mobile device can be different according to a extraction layer even if the events are same. And, the sequence of events extracted from an application is changeable in the environment that multiple applications are operated concurrently. Therefore, even though the same applications is executed to the same sequence, the generation sequence of events is revised in accordance with the state of mobile device system, and whether the errors occur according to circumstances or not. This kind of application software error is very difficult to perform a debugging operation. In this paper, the execution state of various applications is verifiable through the re-editing of events after analyzing the events which is generated in application, kernel, middleware layer, and the event arrange/editor is designed and implemented to understand efficiently the influence on application, kernel, and middleware layer for events.
Design of After-processing Encrypted Record System for Copy Protection of Digital Video Optical Discs
Kim, Hyeong-Woo ; Joo, Jae-Hoon ; Kim, Jin-Ae ; Choi, Jung-Kyeng ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1435~1440
DOI : 10.6109/jkiice.2010.14.6.1435
This paper presents encrypted secret code recording system which can insert an unique manufacture ID code after complete disc process. First, we detect a memory block synchronizing signal which is SYNC. by using FPGA, then, design a recording pattern to write Multi Pulse. Finally, a method that any data is recorded in any place in any data area of optical disc by using a FPGA was proposed. Newly proposed method in this paper that any user records user data in protected data areas on digital video optical discs, can be very useful for effective software copy protection, and can be applicable to encrypted record on high density DVD in near future.
A Study on Constructing the Divider using Sequential Logic Systems
Park, Chun-Myoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1441~1446
DOI : 10.6109/jkiice.2010.14.6.1441
This paper presents a method of constructing the divider using sequential logic systems over finite fields(or galois fields). The proposed the sequential logic systems is constructed by as following. First of all, we obtain the linear characteristics between present state and next state based on mathematical properties of finite fields and sequential logic systems. Next, we realize the sequential logic systems over finite fields using above linear characteristics and characteristic polynomial which is expressed using by matrix. Also, we apply to implement divider using the proposed sequential logic systems over finite fields.
A Study on Performance Evaluation and Security Methods of u-IT Electrical Safety Integrated Management System`s Module
Park, Dae-Woo ; Kim, Eung-Sik ; Choi, Choung-Moon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1447~1452
DOI : 10.6109/jkiice.2010.14.6.1447
Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. u-City in order to prevent the disaster of u-IT Power Equipment Performance Module and the security for the safety of the u-City is necessary. In this paper, the power unit of u-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation methods and security methods will be studied. u-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as u-IT integrated management system for electrical safety and strengthen the security, safety and security with a u-City will contribute to the construction and operation.
Cold Storage Management System using RFID Deployment Simulator for Optimized Business Process
Baek, Sun-Jae ; Moon, Mi-Kyeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1453~1459
DOI : 10.6109/jkiice.2010.14.6.1453
Recently, the aim of cold storage warehouse is not only to provide preservation of the quality of perishable foods but also to use state-of-the-art information systems to rapidly move products across the cold chain. An RFID (Radio Frequency Identification) is an automatic identification method that detects signals from mobile objects, and tracks and traces movement of the objects. RFID can be used to turn a cold storage warehouses into a real-time system. In this paper, we develop an cold storage management system to support the optimized business processes with RFID system. First of all, business processes in the cold storage warehouse are analyzed. Then design factors which should be considered for incorporating RFID are defined. Design values which set to the design factors can be extracted from using RFID deployment simulator. as a result, the design values make RFID to be efficiently integrated to existing business processes.
Analysis of Breakdown voltage for Trench D-MOSFET using MicroTec
Jung, Hak-Kee ; Han, Ji-Hyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1460~1464
DOI : 10.6109/jkiice.2010.14.6.1460
In the paper, the breakdown voltage of Trench D-MOSFET have been analyzed by using MircoTec. The technology for characteristic analysis of device for high integration is changing rapidly. Therefore to understand characteristics of high-integrated device by computer simulation and fabricate the device having such characteristics became one of very important subjects. A Trench MOSFET is the most preferred power device for high voltage power applications. The oxide thickness and doping concentration in Trench MOSFET determines breakdown voltage and extensively influences on high voltage. We have investigated the breakdown voltage characteristics according to variation of doping concentration from
in this study. We have also investigated the breakdown voltage characteristics according to variation of oxide thickness and junction depth.
The Wet Etching Rate of Metal Thin Film by Sputtering Deposition Condition
Hur, Chang-Wu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1465~1468
DOI : 10.6109/jkiice.2010.14.6.1465
The wet etching is a process using chemical solution and occurring chemical reaction on substrate surface. when we do wet etching process, we have to consider stoichiometry, etching time and temperature of etchant for good resolution. In this experiment, we used Cr, Al andIndium-tin-oxide (ITO) metal and we deposited them with DC sputtering machine. The Cr thin film metal thickness is about
, ITO films show a low electrical resistance and high transmittance in the visible range of an optical spectrum and Ai film is used for signal line. We measured and analysed wet etching properties on the metal thin films.
Color Image Encryption using MLCA and Transformation of Coordinates
Yun, Jae-Sik ; Nam, Tae-Hee ; Cho, Sung-Jin ; Kim, Seok-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1469~1475
DOI : 10.6109/jkiice.2010.14.6.1469
This paper presents a problem of existing encryption methods using pseudo-random numbers based on MLCA or complemented MLCA and proposes a method to resolve this problem. The existing encryption methods have a problem which the edge of original image appear on encrypted image because the image have color similarity of adjacent pixels. In this proposed method, we transform the value and spatial coordinates of all pixels by using pseudo-random numbers based on MLCA. This method can resolve the problem of existing methods and improve the level of encryption by encrypting pixel coordinates and pixel values of original image. The effectiveness of the proposed method is proved by conducting histogram and key space analysis.
Learner`s Satisfaction Survey and Analysis in the University Cyber Education
Kim, Chang-Su ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1476~1481
DOI : 10.6109/jkiice.2010.14.6.1476
Cyber education community in the digital era is going on across all areas of knowledge accumulation rate of acceleration of the demand for retraining and lifelong learning can effectively accommodate. Therefore, new teaching methods in the future as consumer-driven 21st century is expected to settle into the main education system. However, to properly interact with people due to lack of feedback delay, reading and writing intensive courses is detrimental to the environment caused by a particular student, and Computer skills are based on computer-related technology to disadvantage poor students, and many have problems. In this paper, recent university education and cyber education requires a paradigm shift is required in an environment that factors affecting students` satisfaction were evaluated, and Improvement of cyber education will be studied.
A Study on the Methodology of Stereo-Scope Visualization Using Virtual Reality Technique
Shin, Mi-Hae ; Seo, Su-Seok ; Kim, Eui-Jeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1482~1487
DOI : 10.6109/jkiice.2010.14.6.1482
Recently, Product and contents using virtual reality technique is spreading quickly. Visualization using virtual reality technique is provide a differentiated experience with existing visualization methodology by giving enhanced immersiveness to users. This paper is make a suggestion to a new methodology of stereo-scope visualization and talk about this utilization possibility. We proposed the design method of stereo-scope realization system that is composed at least two screen. through which users will feel more immersiveness and experience to virtual reality. The suggestion system of this paper will widely used in various industry such as virtual reality exhibitions, shows, games, training programs, etc.
A Study of Environment Monitoring System based on USN
Choi, Sam-Gil ; Kim, Ki-Tael ; Kim, Dong-Il ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1488~1492
DOI : 10.6109/jkiice.2010.14.6.1488
USN(Ubiquitous Sensor Network) is the network that widely applies for life of human being. It works out to sense, storage, process, deliver every kind of appliances and environmental information from the stucktags and sensors. And it is possible to utilize to measure and monitor about the place of environmental pollution which is difficult for human to install. It`s studied constantly since it be able to compose easily more subminiature, low-power, low-cost than previous one. And also it spotlights an important field of study, graft the green IT and IT of which the environment and IT unite stragically onto the Network. This study realize a IAQM(Indoor Air Quility Management) sensing mechanism composition under the network and suggest the application of Environment monitoring system outlook to measure an Environment element.
Mutual Exclusion based Localization Technique in Mobile Wireless Sensor Networks
Lee, Joa-Hyoung ; Lim, Dong-Sun ; Jung, In-Bum ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1493~1504
DOI : 10.6109/jkiice.2010.14.6.1493
The localization service which provides the location information of mobile user, is one of important service provided by sensor network. Many methods to obtain the location information of mobile user have been proposed. However, these methods were developed for only one mobile user so that it is hard to extend for multiple mobile users. If multiple mobile users start the localization process concurrently, there could be interference of beacon or ultrasound that each mobile user transmits. In the paper, we propose LME, the localization technique for multiple mobile nodes in mobile wireless sensor networks. In LME, collision of localization between sensor nodes is prevented by forcing the mobile node to get the permission of localization from anchor nodes. For this, we use CTS packet type for localization initiation by mobile node and RTS packet type for localization grant by anchor node. NTS packet type is uevento reject localization by anchor node for interference avoidance.nghe experimental result shows that the number of interference between nodes are increased in proportion to the number of mobile nodes and LME provides efficient localization.
Residual Neuromuscular Sensing Platform Development using Sensor of Nerve Stimulation Response Measurement during Anesthesia
Shin, Hyo-Seob ; Kim, Young-Kil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1505~1510
DOI : 10.6109/jkiice.2010.14.6.1505
Response to nerve stimulation platform for implementing measures to detect finger movement has been functioning as an important factor. The finger movement of the muscle response to nerve stimulation and sensing Actuator for the H/W development is needed. In addition, a low power embedded CPU based on the top was used. H/W configuration portion of the isolation power, constant current control, High impedance INA, amplifier parts, and the stimulus mode and the Micro-control the status of current, AD converter Low Data obtained through the processing system is implemented.
Performance Analysis of Cooperative Localization Algorithm Considering Wireless Propagation Characteristics
Jeong, Seung-Heui ; Oh, Chang-heon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 14, issue 6, 2010, Pages 1511~1519
DOI : 10.6109/jkiice.2010.14.6.1511
In this paper, we proposed and analyzed a RSSI based cooperative localization algorithm considering wireless propagation characteristics in indoor and outdoor environments for wireless sensor networks, which can estimate the BN position. The conventional RSSI based estimation scheme has low precision ranging due to instability propagation characteristics by time variable. Hence, we implemented ray-launching simulator for analysis of propagation characteristics in 4 case, and experimented proposed localization scheme with 4 RN and 1 to 5 BN. Simulation results show that NLCA has estimation error as 2m-3.5m, however, proposed CLA/ECLA has 1.3m-2.5m/0.5m-1.2m by same environments. Therefore, if we can consider channel characteristics, the proposed algorithm provides higher localization accuracy than RSSI based conventional one.