Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 15, Issue 12 - Dec 2011
Volume 15, Issue 11 - Nov 2011
Volume 15, Issue 10 - Oct 2011
Volume 15, Issue 9 - Sep 2011
Volume 15, Issue 8 - Aug 2011
Volume 15, Issue 7 - Jul 2011
Volume 15, Issue 6 - Jun 2011
Volume 15, Issue 5 - May 2011
Volume 15, Issue 4 - Apr 2011
Volume 15, Issue 3 - Mar 2011
Volume 15, Issue 2 - Feb 2011
Volume 15, Issue 1 - Jan 2011
Selecting the target year
Analysis of Global Gravitational Models based on measured gravity data
Choi, Kwang-Sun ; Lee, Young-Cheol ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1833~1839
DOI : 10.6109/jkiice.2011.15.9.1833
In this study, Global Gravitational Model EGM2008, EGM96 and 16,786 gravity points measured on land were compared and analyzed. On the assumption that land gravity data is most accurate, the correlation coefficient, differences, MSE and difference variance along the height were computed between land gravity data and EGM2008, EG96. The correlation coefficient, land gravity data and EGM2008, was computed most largely with 0.824 and the correlation coefficient with EGM96 was computed with 0.538. The standard deviation of differences between land gravity and EGM2008, EGM96 were 13.196 magl, 18.685 mgal respectively. Also the difference variance scope of EGM2008 was smaller than EGM96. There was no large variance of free-air anomaly differences between land gravity data and EGM2008 along the height however free-air anomaly differences with EGM96 varied along the height changes. Consequently EGM2008 nicely expresses Korea gravity field more than EGM96.
A Study on Analysis of Phase Noise Effects in a FM-CW Radar System
Lee, Jong-Gil ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1840~1846
DOI : 10.6109/jkiice.2011.15.9.1840
It is necessary to estimate the Doppler spectrum for each range cell for the extraction of useful information from the return echoes in radar systems used for the remote sensing purpose such as detection of moving targets and weather surveillance. The signal amplitude in the beat frequency band is the important parameter in the detection and tracking of targets. However, strong clutter echoes do exist in most radar operation environments and the system phase noise spreads both the clutter and signal echoes of the target. In this paper, the effects of this system phase noise are analyzed concerning the clutter and the signal beat spectrum. It is shown that the separation capability of adjacent beat signal depends on the degree of spread in the clutter and beat signal caused by the radar system phase noise
Indoor Propagation Channel Modeling Using the Finite Difference Time Domain Method
Chung, Sun-Oh ; Lim, Yeong-Seog ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1847~1853
DOI : 10.6109/jkiice.2011.15.9.1847
Analysis of an indoor propagation channel has conventionally used the ray-tracing method. But, in this paper, we had modelling the channel for three dimensional indoor structure by the finite difference time domain method for three dimensional full wave analysis. An excitation signal of the FDTD method used plane wave. The plane wave was excited using the total field/scattered field method. And absorbing boundary condition used the perfectly matched layer method with 7 layers. An living room for the simulation of indoor channel modeling is surrounded the wall that be composed of the wood, the conductor, the glass and concrete. When there are furniture in the living room or not, it were simulated, respectively. As simulation results, we could identify the fading effect of multipath at indoor propagation environment, calculated mean excess delay and rms delay spread for the receiver design.
Framework design of simulation-based ship production execution system(SPEXS) in a shipyard
Lee, Kwang-Kook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1854~1864
DOI : 10.6109/jkiice.2011.15.9.1854
Production planning is one of the most important activities in shipbuilding enterprises. Shop-floor supervisors and planners still do not have enough information to effectively analyze shop operations because of the difference between production planning and shop-floor scheduling. In this paper, process analysis was conducted between production planning and shop-floor control to clarify the difference, and the necessity of the manufacturing execution system(MES) was derived in a shipyard. Therefore, the simulation-based ship production execution system(SPEXS) was defined by analyzing characteristics of MES. The architectural functions of the system were deducted from the process of requirement analysis. The SPEXS` framework was constructed on the basis of the architectural functions. This framework will provide more reliable production schedules and allow engineers to plan and control shop operations in real-time.
Detection of Flaws in Air Deck using Non-Destructive Testing
Kim, Kwang-Baek ; Cho, Jae-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1865~1870
DOI : 10.6109/jkiice.2011.15.9.1865
In this paper, we propose an effective method that automatically detects flaws in air deck by using non-destructive testing. First, Gamma correlation transform, 7
7 and 13
13 Sobel mask apply to the image of air deck acquired non-destructive testing in order to detect the edge of the image. Second, the edge detection area is smoothed and corrected by mean binarization method. Finally, the region of flaws in air deck is detected by a labeling method after removing the noise by the erosion and the dilation operation. In experimental results, we showed that the proposed detection method is effective in air deck.
Neural Network PID Controller for Angle and Speed Control of Two Wheeled Inverted Pendulum Robot
Kim, Young-Doo ; An, Tae-Hee ; Jung, Gun-Oo ; Choi, Young-Kiu ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1871~1880
DOI : 10.6109/jkiice.2011.15.9.1871
In this paper, a controller for two wheeled inverted pendulum robot, i.e., Segway type robot that is a convenient and easily handled vehicle is designed to have more stable balancing and faster velocity control compared to the conventional method. First, a widely used PID control structure is applied to the two wheeled inverted pendulum robot and proper PID control gains for some specified weights of users are obtained to get accurate balancing and velocity control by use of experimental trial-and-error method. Next, neural network is employed to generate appropriate PID control gains for arbitrarily selected weight. Here the PID gains based on the trial-and-error method are used as training data. Simulation study has been carried out to find that the performance of the designed controller using the neural network is more excellent than the conventional PID controller in terms of faster balancing and velocity control.
Enhancing Red Tides Prediction using Fuzzy Reasoning and Naive Bayes Classifier
Park, Sun ; Lee, Seong-Ro ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1881~1888
DOI : 10.6109/jkiice.2011.15.9.1881
Red tide is a natural phenomenon to bloom harmful algal, which fish and shellfish die en masse. Red tide damage with respect to sea farming has been occurred each year. Red tide damage can be minimized by means of prediction of red tide blooms. Red tide prediction using naive bayes classifier can be achieve good prediction results. The result of naive bayes method only determine red tide blooms, whereas the method can not know how increasing of red tide algae density. In this paper, we proposed the red tide blooms prediction method using fuzzy reasoning and naive bayes classifier. The proposed method can enhance the precision of red tide prediction and forecast the increasing density of red tide algae.
Novel Channel Allocation Scheme for the Multi-Channel Cognitive wireless Networks
Park, Hyung-Kun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1889~1894
DOI : 10.6109/jkiice.2011.15.9.1889
Channel allocation is one of the important issues in the multichannel transmission. In the cognitive radio networks, channel allocation scheme should be designed to improve spectrum efficiency without interfering with the transmission of licensed users. In this paper, we propose a spectrum hole prediction based channel allocation scheme. The proposed channel allocation scheme, predicts spectrum hole by using the channel success rate, and limit the transmission of secondary user`s data, and it reduces the interference to the primary user. The performance of proposed channel allocation scheme is evaluated by the computer simulation.
Optimal Quantization Bits Decision of Soft-Decision BCH Codes for DVB-RCS NG Systems
Kim, Min-Hyuk ; Park, Tae-Doo ; Lim, Byeong-Su ; Jung, Ji-Won ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1895~1902
DOI : 10.6109/jkiice.2011.15.9.1895
The soft-decision e-BCH decoding algorithm based on the Chase algorithm is adopted in DVB-RCS NG systems. For implementation, it is necessary to decide the number of optimal quantization bits when soft-decision e-BCH decoding algorithm is processed. Also, the performance must be satisfied. Therefore, in this paper, when the soft-decision e-BCH decoder is implemented, we select the number of optimal quantization bits using BER performance.
Development of Vehicle Motion Monitoring Module based on Smartphone
Hwang, Jae-Young ; Chung, Shin-Il ; Chung, Yeon-Ho ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1903~1909
DOI : 10.6109/jkiice.2011.15.9.1903
This paper presents the development of a core module for integrating data from vehicle by the convergence technology of mobile telematics and black-box. This emerging technology can be referred to as Black-box in Mobile (BIM). For the development of BIM, sensors and cameras were realized in a driving robot. Relevant hardware implementation was achieved to verify the functionality of BIM. The transmitted signal from the driving robot was confirmed in an Android-based portable device. Existing Black-boxes were mostly developed by major transportation companies and focused only on storing data. The proposed BIM offers not only data storage but also easy-to-use real-time monitoring while in motion. In addition, the vehicle can be monitored on parking through shock sensors. This development is considered commercially viable as it is achieved via software implementation.
Design and Implementation of a Virtual Computer Lab System using Cloud Computing
Lee, Bong-Hwan ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1910~1917
DOI : 10.6109/jkiice.2011.15.9.1910
In this paper, a cloud computing platform is designed and implemented based on an open source cloud platform, OpenNebula, and Xen hypervisor on each node for efficient computer lab system. For the purpose of convenient management, a web-based user interface has been developed for the cloud virtualization system. Once individual virtual machine is allocated to a user based upon class schedule, each user can access the virtual machine remotely and use appropriate operating system and application programs. The developed system can reduce computer lab upgrade cost, management cost, and administration time considerably.
Web-based POD system Using the COM Port
Ham, Jong-Wan ; Kim, Hak-Jin ; Jung, Hoe-Kyung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1918~1924
DOI : 10.6109/jkiice.2011.15.9.1918
This article proposes a POD system framework which creates templates by using the Web service environment with good accessibility, provides them so that users can easily edit them, and uses COM ports following Web standard capable of real-time printing with the same quality as edited files. The characteristic of framework proposed in this article is that it creates programs which users with basic skill in Internet use can learn and use relatively easily when compared with existing specialized editing programs and which allows users to print real-time such files as personally created by them in the same quality as on the screen, and thereby enhances accessibility thereof.
A Study on Canny Edge Detector Design Based on Image Fuzzification
Park, Mi-Young ; Kim, Chul-Won ; Park, Jong-Hoon ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1925~1931
DOI : 10.6109/jkiice.2011.15.9.1925
This paper suggests an approach to the subtle concept, "good", through the fuzzy logic and the design of the Canny edge detector of Gray scale images based on the rules of fuzzy anisotropic diffusion. The Canny edge detection algorithms design is to divide the gray levels into pixels and then calculate the diffusion coefficients at each pixel of non-edgy regions. Based on this processing, we present the Canny edge detector implementing fuzzy logic and comparing the results to other existing methods. The proposed approach is the narrow dynamic range of the gray-level image Sharpening the edge detection and has the advantage.
Trend analysis of open source distribution related to installation
Jung, Sung-Jae ; Bae, Yu-Mi ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1932~1938
DOI : 10.6109/jkiice.2011.15.9.1932
Public source code distribution form is done by mainly by limited class user and it was too hard to install. But companies are increasing who distribute software as open source, mass of people`s interest also became high and it is coming about installation related methods have been changing. Not only traditional compile based installation, it is entrance on the stage of user friendly technique that is package installation, network based install, file execution after uncompression and cmake method to give easily to developer various platform support. This paper will analyze open source operating system Linux based public open source distributed application installation trend.
Expander graphs based on 60/102 NBCA and its application
Kim, Han-Doo ; Cho, Sung-Jin ; Choi, Un-Sook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1939~1946
DOI : 10.6109/jkiice.2011.15.9.1939
Expander graphs are useful in the design and analysis of communication networks. Mukhopadhyay et. al introduced a method to generate a family of expander graphs based on nongroup two predecessor single attractor CA(Cellular Automata). In this paper we propose a method to generate a family of expander graphs based on 60/102 Null boundary CA(NBCA) which is a group CA. The spectral gap generated by our method is larger than that of Mukhopadhyay et. al . As an application we give an algorithm which generate one-way functions whose security lies on the combinatorial properties of our expander graphs. the one-way function using d-regular graph generated by the 60/102 NBCA is based on the Goldreich`s construction .
Protecting Memory of Process Using Mandatory Access Control
Shim, Jong-Ik ; Park, Tae-Kyou ; Kim, Jin-Tae ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1947~1954
DOI : 10.6109/jkiice.2011.15.9.1947
There are various attacks such as tampering, bypassing and spoofing which are caused with system-wide vulnerabilities of Windows operating system. The underlying operating system is responsible for protecting application-space mechanisms against such attacks. This paper provides the implementation of mandatory access control known as multi-level security (MLS) rating with TCSEC-B1 level on th kernel of Windows
. By adding especially the protection feature against tampering memory of processes to the security kernel, this implementation meets the responsibility against system-wide vulnerabilities.
A Security Protocol for Swarming Technique in Peer-to-Peer Networks
Lee, Kwan-Seob ; Lee, Kwan-Sik ; Lee, Jang-Ho ; Han, Seung-Chul ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1955~1964
DOI : 10.6109/jkiice.2011.15.9.1955
With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.
Switching Function Implementation based on Graph
Park, Chun-Myoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1965~1970
DOI : 10.6109/jkiice.2011.15.9.1965
This paper proposes the method of switching function implementation using switching function extraction based on graph over finite fields. After we deduce the matrix equation from path number of directional graph, we propose the switching function circuit algorithm, also we propose the code assignment algorithm for nodes which is satisfied the directional graph characteristics with designed circuits. We can implement more optimal switching function compare with former algorithm, also we can design the switching function circuit which have any natural number path through the proposed switching function circuit implementation algorithms. Also the proposed switching function implementation using graph theory over finite fields have decrement number of input-output, circuit construction simplification, increment arithmetic speed and decrement cost etc.
An Approach for Managing Storage Locations in RFID-Based Cold-Storage Warehouse System
Moon, Mi-Kyeong ; Choi, Bong-Jun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1971~1978
DOI : 10.6109/jkiice.2011.15.9.1971
In RFID-based cold-storage systems, product locations are recognized as the logical locations of RFID readers which are attached to the entrance of the cold rooms. However, through these methods, product locations can be incorrect in many different situations of a storage. Cold storage rooms have a huge rage in temperature, and the product in the cold-storage spoils easily. Therefore, highly precise product locations is very important for the product quality In this paper, a new approach is suggested to manage the storage location inaccuracy by adding two readers to existing forklift and attaching RFID tags to the ceiling. One reader recognizes ceiling tags to acquire location data, and the other recognizes product tags to acquire product detail data loaded on the forklift. The product can be seamlessly tracked and traced in realtime by monitoring and analyzing data gathered from these readers. Through the proposed location management method, the effectiveness of the product management in cold-storage can be improved consequently.
DC Platform Design for Home Application
Han, Snag-Soo ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1979~1984
DOI : 10.6109/jkiice.2011.15.9.1979
This paper proposes the green platform of implementing the DC system in a house. The architecture is designed to be the platform that merges modern loads, energy sources and bidirectional devices. Converting all voltage levels and systems into DC and supplying directly to the load improves efficiency of the system. We propose the implementation steps that can be done by modifying current technologies.
Design of Digital Block for LF Antenna Driver
Sonh, Seung-Il ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1985~1992
DOI : 10.6109/jkiice.2011.15.9.1985
PE(Passive Entry) is an automotive technology which allows a driver to lock and unlock door of vehicle without using smart key buttons personally. PG(Pssive Go) is an automotive technology which offers the ability to start and stop the engine when there is a driver in vehicle with smart key. When these two functions are unified, we call it PEG(Passive Entry/Go). LF(Low Frequency) antenna driver which is one of core technologies in PEG is composed of a digital part which processes commands and an analog part which generates sine waveform. The digital part of antenna driver receives commands from MCU(or ECU), and processes requested commands by MCU, and stores antenna-related driver commands and data on an internal FIFO block. The digital part takes corresponding actions for commands read from FIFO and then transfers modulated LF data to analog part. The analog part generates sine waveform and transmits outside through antenna. The designed digital part for LF antenna driver can acomplish faster LF data transmission than that of conventional product. LF antenna driver can be applicable to the areas such as PEG for automotive and gate opening and closing of building.
An efficient hardware implementation of 64-bit block cipher algorithm HIGHT
Park, Hae-Won ; Shin, Kyung-Wook ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 1993~1999
DOI : 10.6109/jkiice.2011.15.9.1993
This paper describes a design of area-efficient/low-power cryptographic processor for HIGHT block cipher algorithm, which was approved as standard of cryptographic algorithm by KATS(Korean Agency for Technology and Standards) and ISO/IEC. The HIGHT algorithm, which is suitable for ubiquitous computing devices such as a sensor in USN or a RFID tag, encrypts a 64-bit data block with a 128-bit cipher key to make a 64-bit cipher text, and vice versa. For area-efficient and low-power implementation, we optimize round transform block and key scheduler to share hardware resources for encryption and decryption. The HIGHT64 core synthesized using a 0.35-
CMOS cell library consists of 3,226 gates, and the estimated throughput is 150-Mbps with 80-MHz@2.5-V clock.
Dependence of Drain Induced Barrier Lowering for Doping Profile of Channel in Double Gate MOSFET
Jung, Hak-Kee ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2000~2006
DOI : 10.6109/jkiice.2011.15.9.2000
In this paper, the drain induced barrier lowering(DIBL) for doping distribution in the channel has been analyzed for double gate MOSFET(DGMOSFET). The DGMOSFET is extensively been studing because of adventages to be able to reduce the short channel effects(SCEs) to occur in convensional MOSFET. DIBL is SCE known as reduction of threshold voltage due to variation of energy band by high drain voltage. This DIBL has been analyzed for structural parameter and variation of channel doping profile for DGMOSFET. For this object, The analytical model of Poisson equation has been derived from Gaussian doping distribution for DGMOSFET. To verify potential and DIBL models based on this analytical Poisson`s equation, the results have been compared with those of the numerical Poisson`s equation, and DIBL for DGMOSFET has been investigated using this models.
Motion Direction Oriented Fast Block Matching Algorithm
Oh, Jeong-Su ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2007~2012
DOI : 10.6109/jkiice.2011.15.9.2007
To reduce huge computation in the block matching, this paper proposes a fast block matching algorithm which limits search points in the search area. On the basis of two facts that most motion vectors are located in central part of search area and matching error is monotonic decreasing toward the best similar block, the proposed algorithm moves a matching pattern between steps by the one pixel, predicts the motion direction for the best similar block from similar blocks decided in previous steps, and limits movements of search points to
on it. As a result, it could remove the needless search points and reduce the block matching computation. In comparison with the conventional similar algorithms, the proposed algorithm caused the trivial image degradation in images with fast motion but kept the equivalent image quality in images with normal motion, and it, meanwhile, reduced from about 20% to over 67% of the their block matching computation.
Detection of coronary artery stenosis using Fuzzy algorithm
Lee, Ju-Won ; Kim, Sung-Hu ; Kim, Joo-Ho ; Lee, Han-Wook ; Jung, Won-Geun ; Lee, Gun-Ki ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2013~2018
DOI : 10.6109/jkiice.2011.15.9.2013
Coronary angioplasty and coronary artery bypass graft, both are for the treatment of myocardial infarction widely used methods. For these procedures, there are especially difficulties in stenosis of blood vessels to diagnose accurately. To remedy this problem, by several researchers by using edge detection to detect stenosis of blood vessels has been studying. However, the results of using these methods vary defend on the vascular structure and the quality of the image. In this study, to improve these problems, the new algorithm is proposed. The proposed algorithm consists of methods to detect bifurcation of blood vessels and its ending point by using multi sampling, threshold and fuzzy algorithm. To evaluate the performance of the proposed algorithm, angiography was used for the different results of the blood vessels of the proposed algorithm, and the result was effective in detecting bifurcation of blood vessels and its ending point.
A trust-based algorithm for reducing broadcast traffic in USN
Choi, Ji-Young ; Kim, Nam-Hoon ; Park, Ho-Hyun ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2019~2031
DOI : 10.6109/jkiice.2011.15.9.2019
Recently USN has been widely used and a lot of research issues have been focused on network configuration. The SOS system is one of the USN applications. The SOS system inherently uses broadcasting due to its emergency. However, a naive broadcasting may cause a significant problem called broadcasting storm. This paper introduces a new trust concept into USN and proposes a new broadcasting algorithm solving the broadcast storm problem.
Ovarian Cancer Microarray Data Classification System Using Marker Genes Based on Normalization
Park, Su-Young ; Jung, Chai-Yeoung ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2032~2037
DOI : 10.6109/jkiice.2011.15.9.2032
Marker genes are defined as genes in which the expression level characterizes a specific experimental condition. Such genes in which the expression levels differ significantly between different groups are highly informative relevant to the studied phenomenon. In this paper, first the system can detect marker genes that are selected by ranking genes according to statistics after normalizing data with methods that are the most widely used among several normalization methods proposed the while, And it compare and analyze a performance of each of normalization methods with mult-perceptron neural network layer. The Result that apply Multi-Layer perceptron algorithm at Microarray data set including eight of marker gene that are selected using ANOVA method after Lowess normalization represent the highest classification accuracy of 99.32% and the lowest prediction error estimate.
A Level System Design for Achievement-assessing of Serious Game
Yoon, Seon-Jeong ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2038~2044
DOI : 10.6109/jkiice.2011.15.9.2038
Serious games are selected by users according to the original goals such as education, treatment, training and so on. Therefore, those type of games are evaluated inside and outside the game about whether the goals are archived or not. Among quality test elements of serious game, assessment is about whether, in games, ability to verify goal achievement is included or not. In this paper, we examined the achievement-assessing function of serious game through several cases. Furthermore, to utilize for developing serious games for English learning, we designed a level system which achievement-assessing function is applied to. In this level system, we used `competition and reward` as the core elements of game, and designed the system through simulation of which grades are level-designed along the user`s English proficiency level based on notice of MEST(Ministry of Education, Science and Technology). This paper is expected to be useful reference for designing English learning game containing achievement assessing function.
A Study on the DOP Improvement using Hybrid Satellite Navigation System
Choi, Chang-Mook ; Ko, Kwang-Soob ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2045~2049
DOI : 10.6109/jkiice.2011.15.9.2045
In this paper, the DOP improvement was studied for the solution to an intentional jamming and the increase of position accuracy by selecting preferred satellites with hybrid satellite navigation system(both GPS and GLONASS). As a result of data analysis, the increases in 0.3 ~ 0.8 GDOP, 0.2 ~ 0.6 PDOP, and 0.1 ~0.3 TDOP were acquired by using hybrid satellite navigation system instead of GPS-only.
Requirement management program for the Development of the Avionics Operational Flight Program
Park, Kyoung-Choon ; Seo, Jung-Bae ; Bae, Jong-Min ; Kang, Hyun-Syug ;
Journal of the Korea Institute of Information and Communication Engineering, volume 15, issue 9, 2011, Pages 2050~2058
DOI : 10.6109/jkiice.2011.15.9.2050
The objective of this thesis is to research the software requirement management system for the development of operational flight program (OFP) which is embedded in aircraft avionics. It offers the function to record the requirement revision log. In fact, the COTS (commercial off-the-shelf) program which has similar function already exists in the market. But this kind of software programs are too complicated and relatively expensive in acquisition. Furthermore, they require too expensive maintenance cost, medium sized business company, this thesis intended to provide the software requirement management system that can be simply installed and easily used.