Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information and Communication Engineering
Journal Basic Information
Journal DOI :
The Korean Institute of Information and Commucation Engineering
Editor in Chief :
Volume & Issues
Volume 6, Issue 8 - Dec 2002
Volume 6, Issue 7 - Nov 2002
Volume 6, Issue 6 - Oct 2002
Volume 6, Issue 5 - Aug 2002
Volume 6, Issue 4 - Jun 2002
Volume 6, Issue 3 - May 2002
Volume 6, Issue 2 - Apr 2002
Volume 6, Issue 1 - Feb 2002
Selecting the target year
A Study on the Radio Transmission of Bio-Signal for Tele-Medicine
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 379~385
Tele-medicine and emergency medical system are necessary for moving from an accidental point or far distance to a hospital and emergency treatment or home treatment before a hospital. Emergency treatment is extremely important in the case of death before arriving a hospital and deformed of disabled by medical treatment delay. A necessary element for this medical system is the emergency communication system. This system is on preparing for an ability of furnishing patient status to a corresponding health service by monitoring the patient at an ambulance of the accident place. This is the transportation of basic biological information of a patient to a medical center by wireless communication system and the corresponding hospital of medical center examine the patient by monitoring, then they can send emergency medical order to the patient for emergency treatment. The TRS is most efficient way of emergency medical communication system, which is currently used with popularity. In this paper studied simultaneously a way of detecting and transporting bio-logical signals, and monitoring of transporting data with communication of voice in the accident place of ambulance.
Adaptive Buffer Management Method for Quality of Service of Internet Telephony
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 386~392
Internet telephony is an application that transmits voice data for conversation. Therefore it must provide high sound quality. However while audio packets are transferred through the network, they are affected by delay variations and jitters, which could result in poor sound quality of the receiving end does not have an appropriate jitter buffer to overcome network factors. This thesis introduces a buffer management algorithm that could be used to provide better sound quality for Internet phone terminals. This algorithm actively responds to both the compression algorithms that are used by the terminals, as well as to the received data to provide an improvement in sound quality. In order to verify the effectiveness of the proposed algorithm, we experimented in variance network settings. The results show that the proposed algorithm improves on the performance of the conventional buffer management algorithm.
Analysis of Establishing IT Research Infrastructure Projects
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 393~398
This paper presents an effective policy of information telecommunication R & D infrastructure project. In order to survive the infinite competition in this fields, choice and concentration for national R & D play an important role. Results of this project are influenced potentially to the area of related field in contrast to technology R & D. In this approach, suck investigations as research environments, infrastructure, application of results are evaluated, and also verified that this project is essential to the small and medium enterprise.
Performance Improvement of Convolutional Coded Multi-Carrier DS-CDMA System Using Hybrid
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 399~404
Performance of M-ary Impulse Communications System over AWGN Channels
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 405~409
Recently, the FCC commissioners approved limited uses of UWB, and have promised to review the standards to explore the potential of more flexible standards and to address the operation of additional types of UWB operations and technology. In this paper we study performances of UWB communication system according to M-ary schemes with BCH code. And under the AWGN channel, we analysis and compare error probability, the number of M-ary schemes to the two methods that pulse position modulation and pulse amplitude modulation.
The Implementation of an ISDN System-on-a-Chip and communication terminal
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 410~415
This paper describes the implementation of a SoC(System-on-a-Chip) and an ISDN communication terminal by the SoC in ISDN network. The SoC has been developed with the functions of 32-bit ARM7TDMI RISC core processor, network connection with S/T interface, TDM--bus interface and voice codec, user interface. And we also review the developed software structure and the ISDN service protocol procedures which are working on the SoC. And finally this paper describers a structure of an ISDN terminal equipment using the implemented SoC and terminal software.
A Study on the World Wide Web Traffic Source Modeling with Self-Similarity
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 416~420
Traditional queueing analyses are very useful for designing a network's capacity and predicting there performances, however most of the predicted results from the queueing analyses are quite different from the realistic measured performance. And recent empirical studies on LAN, WAN and VBR traffic characteristics have indicated that the models used in the traditional Poisson assumption can't properly predict the real traffic properties due to under estimation of the long range dependence of network traffic and self-similarity In this parer self-similar characteristics over statistical approaches and real time network traffic measurements are estimated It is also shown that the self- similar traffic reflects network traffic characteristics by comparing source model.
Modeling of Static Var Compensator with Hybrid Cascade 5-level PWM Inverter Using Circuit DQ Transformation
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 421~426
Hybrid cascade multilevel PWM inverter has advantages of hybrid structure which enhances the better utilization of power semiconductor switches, that is, both hi호 power-low frequency switch, GTO and low power-high frequency switch, IGBT can be used in the same circuit. In this paper, a static var compensator using hybrid cascade 5-level PWM inverter is presented for high voltage/high power applications. The proposed system is modelled by circuit DQ transformation, and thus an equivalent circuit is obtained which reveals the important characteristics of the system and lead to the related equations. Finally, circuit structure and characteristics is presented and the validity of the characteristics analysis is shown through PSIM simulation.
A Cryptoprocessor for AES-128/192/256 Rijndael Block Cipher Algorithm
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 427~433
This paper describes a design of cryptographic processor that implements the AES(Advanced Encryption Standard) block cipher algorithm "Rijndael". To achieve high throughput rate, a sub-pipeline stage is inserted into the round transformation block, resulting that the second half of current round function and the first half of next round function are being simultaneously operated. For area-efficient and low-power implementation, the round block is designed to share the hardware resources in encryption and decryption. An efficient scheme for on-the-fly key scheduling, which supports the three master-key lengths of 128-b/192-b/256-b, is devised to generate round keys in the first sub-pipeline stage of each round processing. The cryptoprocessor designed in Verilog-HDL was verified using Xilinx FPGA board and test system. The core synthesized using 0.35-
CMOS cell library consists of about 25,000 gates. Simulation results show that it has a throughput of about 520-Mbits/sec with 220-MHz clock frequency at 2.5-V supply.-V supply.
Cain Control Method and Controller Design in Erbium-Doped fiber Amplifier
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 434~439
Circular Polarization of Sierpinski Fractal Triangular Antenna by Sequential Rotation Techniques
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 440~444
A microstrip patch antenna with circular polarization based on the Sierpinski fractal geometry is proposed. The Sierpinski fractal is composed of 3 equilaterial triangular patch and is easy to produce a circular polarization by sequentially rotation techniques. The characteristics of a 1x3 antenna array from Sierpinski geometry are investigated, i.e. port isolation and AR(axial Ratio).
Investigation of tracking method for a manuevering target using IMM with OTSKE
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 445~451
In this paper, we propose a new tracking algorighm that achieves good tracking performance in manuevering targets while capping the computation load to "low". Kalman Filler (KF) is generally known to be poor in tracking maneuvering targets. IMM, on the other hand, compensates the weakness inherent in the mundane KF and is considered as a promising alternative for tracking maneuvering targets. However, IMM suffers from substantially increased computational load as the number of models increases. To remedy this problem, we propose a new method focused to reducing the computational load and attaining the desirable tracking performance at least as good that of IMM. It is achieved by essentially adopting the structure of IMM and injecting Optimal Two-Stage Kalman Estimator (OTSKE). The representative simulation shows a reduction in computational load with the proposed OTSKE but further reduction is shown achieved (by about 58%) with the Interacting Acceleration Compenstation (IAC)-OTSKE approach. approach.
Caching Methods of Client-Server Systems for Vector Map Services based on Mibile Phone
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 452~458
Although the reuse of the cached data for scrolling the map reduces the amount of passed data between client and server, it needs the conversions of data coordinates, selertive deletion of objects and cache compaction at client. The conversion is time intensive operation due to limited resources of mobile phones such as low computing power, small memory. Therefore, for the efficient map control in the vector map service based mobile phone, it is necessary to study the method for reducing wireless network bandwidth and for overwhelming the limited resources of mobile phone as well. This paper proposes the methods for racking pre-received spatial objects in client-server systems for mobile CIS. We also analyze the strengths and drawbacks between the reuse of cached data and transmission of raw data respectively.
The effect of gain recovery at the optical fiber amplifier by the input pulse train
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 459~463
We studied the effect of gain recovery at the optical fiber amplifier by the input pulse trains We also theoretically analyzed the limitation of the saturation and recovery time for the PDFA(Praseodymium-Doped Fiber Amplifier) which has the spectral gain at 1.3
band. We can predict the interval between the pulse train, pump power, and the effect of the saturation and recovery time which is affected to the amplification of the optical pulse.
Nonvisibility and robustness evaluation of image watermarking mixed Key and Logo method
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 464~469
In this research, nonvisibility and robustness of image watermarking mixed Key and Logo method were evaluated. The role of the Key was performed by a personal ID of a copyrighter and the logo images were used as the watermark. The standard image of Lena was used for experimental image and binary images of `Park'with size 32
32 and 64
64 were used for the watermark, respectively In order to evaluate nonvisibility of the proposed watermarking scheme, PSNR(Peak Signal to Noise Ratio) of the watermarked image was obtained and for robustness reconstructive rates of the reconstructed watermark were obtained from the watermarked image with image transformation of JPEG lossy compression. The experimental results show that nonvisibility is excellent as PSNR of the watermarked image is 93.75dB and the reconstructive rates of the case of 322
32 watermark was better than the case of the 64
64 watermark; average 5.9%, 13.9%, 6.5%, and 4.2% in the case of scale-down rates, rotational rates, impulse noise power density, and JPEG lossy compression rates, respectively.
A Study on Graylevel Image Scanning System Realization Using CIS
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 470~474
The graylevel image scanning system realization and design using CIS(Contact image Scanning)be amenable to recognize a papers, OMR and OCR sheet is proposed. The design technique is used CIS scanning sensor in fixing step motor and is optimized with DSP processor for inage processing, and transfer input image data par line in feeding a step unit to PC on the USB interfacer. This system is portable ad A4 size scanning. and keeps image scan processing speed 300mm/sec. The recognition percentage has 98% on the OCR and bar codes.
A Study of An XML-Based e-Marketplace Integration System for Sharing Corporate Business Information
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 475~480
As major industries become information -centered, business transactions and information -sharing processes are being computerized and automated, which ultimately re-defines electronic commercial transactions in a broader context. Business documents are the basic tools for corporate transactions. The use of business documents in electronic commercial transactions has increased markedly and this sphere is rapidly being extended to include information sharing between companies. XML(extensible Markup Language) was selected as the focus for this thesis. XML can help to make a complicated and data-rich document easy to share. The thesis proposes a business XML document editing system, comprised of a style document editor for business XM document structure, business documentation, and business document presentation, along with a business document transformation system which makes a transformation possible regardless of platform or using various corporate document standards.
Performance Comparison of the CELM Encryption Algorithm
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 481~486
In this paper, we propose CELM(Cascade ELM) to improve stability. We could realize as cascade connected each other key value with N degree equation which has a initial value. And we could know to be improved in stability with the nature of Chaos in simulation result. In efficiency, this CELM algorithm identified sire of encrypted code with size of source code and we could know more efficient than existing RSA and ECC. In speed, CELM took average 0.18㎳ degree to encrypt a file. Although it was slower than DES, it was faster than ECC of RSA.
Control Method of an Unknown Nonlinear System Using Dynamical Neural Network
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 487~492
In this paper, we proposed a control method of an unknown nonlinear system using a dynamical neural network. The proposed method is composed of neural network of state space model type, performs for a unknown nonlinear system, identification with using the dynamical neural network, and then a nonlinear adaptive controller is designed with these identified informations. In order to verify the effectiveness of the proposed method, we simulated one-link manipulator. The simulation results showed the effectiveness of using the dynamical neural network in the adaptive control of one-link manipulator.
A Study on the management system operation of the maritime network
Journal of the Korea Institute of Information and Communication Engineering, volume 6, issue 3, 2002, Pages 493~498